Table of Contents

RDS-Tools, provider of remote desktop management solutions, is thrilled to announce the release of RDS-Advanced Security 6.4. This latest version of their cybersecurity software offers robust protection for remote desktop environments. With significant performance improvements, RDS-Advanced Security 6.4 delivers enhanced efficiency, ensuring a secure computing experience for users.

On January 30th, a series of distributed denial-of-service (DDoS) attacks targeted numerous medical centers across the United States, including prestigious institutions like Stanford Healthcare, Duke University Hospital, and Cedars-Sinai. In response to this evolving threat landscape, RDS-Tools has incorporated an extensive database of over 16,000 new IP addresses into the hacker IP list of RDS-Advanced Security. This proactive approach specifically addresses KillNet DDoS attacks, automatically blocking millions of well-known cybercriminal IPs. The feature provides users with efficient and visible protection against these malicious attacks.

The additional IP addresses have been carefully selected to target the KillNet group, offering a comprehensive solution for institutional and public users of RDS-Advanced Security who face a higher risk of such attacks.

What is KillNet?

KillNet is an activist hacker group associated with pro-Russian sentiments. The group gained notoriety for executing DoS and DDoS cyberattacks against government institutions and private companies during the Russian invasion of Ukraine in 2022. Formed around March 2022, the group's founder, known as "Killmilk," orchestrated multiple attacks against institutional and governmental websites in various European states, the United States, and Japan. The objective was to impede actions supporting Ukraine by rendering platforms inaccessible, stealing sensitive information, and disrupting production systems.

Additional Features of RDS-Advanced Security

Apart from the enhanced protection against KillNet attacks, RDS-Advanced Security 2.0 includes several other notable features. The update brings performance improvements to Working Hours restriction, Bruteforce Protection, Ransomware Protection, and event analysis related to databases. Users can now add whitelisted programs through a command line interface, enabling greater control over their secure environment. The update also enhances responsiveness during event analysis, ensuring swift action against potential threats.

To learn more about the Hacker IP Protection feature in RDS-Advanced Security 6.4, check the online documentation available at https://docs.rds-tools.com/advanced-security/hacker-ip . For those interested in experiencing the software firsthand, a trial version of RDS-Advanced Security is available for free download from the RDS-Tools website at rds-tools.com .

Safeguard your remote desktop infrastructure with RDS-Advanced Security and stay protected against evolving cyber threats.

Related Posts

RD Tools Software

"Enhancing RDS Security: Integrating Windows Server Update Services with Advanced Security Measures"

As cyber threats grow in sophistication, combining WSUS (Windows Server Update Services) with RDS Tools Advanced Security tools has become essential for comprehensive protection. Explore how Windows Server Update Services supports RDS environments, its limitations in addressing modern security challenges, and re-visit how integration with robust cybersecurity solutions, such as RDS Advanced Security, enhances protection. Then finish with best practices for IT teams to effectively implement this comprehensive server and network security approach.

Read article →
RD Tools Software

"How to Remote Control a Computer: Choosing the Best Tools"

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon