Defending Against Misconfigured MFA & PrintNightmare Vulnerabilities
eSecurity Planet
MARCH 21, 2022
They then authenticated to the victim’s VPN to initiate a remote desktop protocol (RDP) connection to the domain controllers. Deny atypical inbound activity from known anonymization services, to include commercial VPN services and The Onion Router (TOR). When possible, implement multi-factor authentication on all VPN connections.
Let's personalize your content