A summary of activities associated with the malicious use of remote access software
Best practices recommendations for organizations to detect and defend against malicious cyber actors abusing Remote Access Software
Remote access software comprises a wide array of capabilities used to maintain and improve information technology (IT), operational technology (OT), and industrial control systems (ICS) services;
Additionally, Remote access software allows managed service providers (MSPs), software-as-a-service (SaaS) providers, IT help desks, and other network administrators to remotely perform several vital technical functions.