by Haja Mo March 21, 2024 Cybersecurity What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report Previous Story Remote Desktop Protocol: Exposed RDP (is dangerous) Next Story Negligence in Behavioral Health Facilities FAQs