{"id":1558,"date":"2024-07-30T14:16:05","date_gmt":"2024-07-30T14:16:05","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/30\/the-power-and-peril-of-rmm-tools\/"},"modified":"2024-07-30T14:16:05","modified_gmt":"2024-07-30T14:16:05","slug":"the-power-and-peril-of-rmm-tools","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/30\/the-power-and-peril-of-rmm-tools\/","title":{"rendered":"The Power and Peril of RMM Tools"},"content":{"rendered":"<p>\u200bAs more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and remote monitoring and management (RMM) tools for system administration.\u00a0<br \/>\nHowever, like any new technology, RMM tools can also be used maliciously. Threat actors can establish connections to a victim&#8217;s device and run commands, exfiltrate data, and stay\u00a0As more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and remote monitoring and management (RMM) tools for system administration.\u00a0<br \/>\nHowever, like any new technology, RMM tools can also be used maliciously. Threat actors can establish connections to a victim&#8217;s device and run commands, exfiltrate data, and stay\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bAs more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and remote monitoring and management (RMM) tools for system administration.\u00a0 However, like any new technology, RMM tools can also be used maliciously. Threat actors can establish connections to a victim&#8217;s device and run commands, exfiltrate data,&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/07\/30\/the-power-and-peril-of-rmm-tools\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">The Power and Peril of RMM Tools<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":1559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1558"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=1558"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/1558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/1559"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=1558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=1558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=1558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}