<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: is it a risk for my main computer? in Cloud Security</title>
    <link>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74667#M448</link>
    <description>&lt;P&gt;Have you disabled drive mapping through remote desktop, or is your C: drive shared to the VM?&lt;/P&gt;</description>
    <pubDate>Tue, 22 Oct 2024 02:05:13 GMT</pubDate>
    <dc:creator>denbesten</dc:creator>
    <dc:date>2024-10-22T02:05:13Z</dc:date>
    <item>
      <title>is it a risk for my main computer?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74642#M446</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Because the vps where I have installed the t-pot doesn't have any graphic cards (GPU), I must connect to the honeypot through RDP. I connect to the t-pot honeypot directly from my main computer. Are there any risks for my main computer, because of this? Could the honeypot attacker, attack my main computer through the rdp client, or find my public ip, from the main computer?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 20 Oct 2024 19:01:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74642#M446</guid>
      <dc:creator>xmtx</dc:creator>
      <dc:date>2024-10-20T19:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: is it a risk for my main computer?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74643#M447</link>
      <description>Yes, there are potential risks when connecting to a T-Pot honeypot via RDP from your main computer, as attackers could attempt to exploit vulnerabilities in the RDP client or gain access to your main computer's public IP. To reduce the risks, it's crucial to keep your RDP client updated, use strong network security measures like VPNs, and enable firewall rules to limit access. Isolating your main computer from the honeypot environment, such as using a virtual machine for RDP access, would further minimize exposure.</description>
      <pubDate>Mon, 21 Oct 2024 05:25:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74643#M447</guid>
      <dc:creator>jaynevado</dc:creator>
      <dc:date>2024-10-21T05:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: is it a risk for my main computer?</title>
      <link>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74667#M448</link>
      <description>&lt;P&gt;Have you disabled drive mapping through remote desktop, or is your C: drive shared to the VM?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 02:05:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Cloud-Security/is-it-a-risk-for-my-main-computer/m-p/74667#M448</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2024-10-22T02:05:13Z</dc:date>
    </item>
  </channel>
</rss>

