<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span>ThreatSTOP is excited to introduce 'Application Control' to our security suite, starting with '<span style="font-weight: bold;">Remote Desktop</span>' management. This new feature enables businesses to effectively manage application communications, ensuring robust protection against unauthorized access and cyber threats. In the coming weeks, we will extend this capability to third-party proxies, VPNs, and social media networks.</span><br><br>We are thrilled to announce the latest enhancement to the ThreatSTOP product suite: 'Application Control'. This new feature marks a significant leap in our commitment to proactive protection, specifically focusing on 'Remote Desktop' support.</p> <!--more--> <p>Remote desktop applications are crucial for business flexibility and are increasingly targeted by cyber attackers. With this rollout, ThreatSTOP now allows businesses to precisely control permissions for applications like AnyDesk, LogMeIn, RemotePC, and others, enhancing network security and operational integrity.</p> <p><span>Cybersecurity authorities such as CISA have noted alarming trends where legitimate RMM tools like TeamViewer and AnyDesk are exploited by cybercriminals to conduct phishing scams and gain unauthorized access</span> <span data-state="instant-open" aria-describedby="radix-:ruf:"><span>(</span><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a" target="_blank" rel="noopener noreferrer">CISA</a><span>)</span></span><span></span><span data-state="closed"> (<a href="https://www.bleepingcomputer.com/news/security/cisa-federal-agencies-hacked-using-legitimate-remote-desktop-tools/" target="_blank" rel="noopener noreferrer">BleepingComputer</a>)</span><span></span><span data-state="closed"> (<a href="https://www.todyl.com/blog/key-takeaways-cisa-warning-malicious-use-legitimate-rmm-tools" target="_blank" rel="noopener noreferrer">TodylCyber</a>)</span><span> (<a href="https://blog.talosintelligence.com/adversaries-are-leveraging-remote-access-tools/" rel="noopener" target="_blank">TalosIntelligence.com</a>).</span><br><br><span>These breaches underscore the importance of stringent application control, as attackers also utilize Remote Access Trojans (RATs) such as njRAT and Poison Ivy to execute malicious activities stealthily</span> <span>(</span><a href="https://www.infosecinstitute.com/resources/hacking/remote-access-tool/" target="_blank" rel="noopener noreferrer">Infosec Institute</a><span>)</span>.</p> <p><span>Our new application control feature not only tightens security over remote access applications but also prepares to expand this protection to cover third-party proxies and VPNs as well as social media platforms, offering comprehensive management of digital threats.</span><br><br>For those interested in enhancing their cybersecurity framework or to learn more about our proactive protections, we invite you to visit our <a href="/threatstop-platform" rel="noopener" target="_blank">product page</a>. Discover how ThreatSTOP can transform your security landscape, offering tailored solutions for organizations of all sizes. Start with a demo today and see the difference proactive protection can make. &nbsp;</p> <p>Existing customer? &nbsp;Want to know how you can control Remote Desktop usage in your environment? &nbsp;Contact our support department today, and we'll be glad to help you.<br><br><span style="font-weight: bold;">Connect with Customers, Disconnect from Risks.</span></p></span>