Microsoft’s Most Recent Security Update Fixes a Zero-Day and 64 New Flaws
September 14, 2022
Microsoft’s Most Recent Security Update released patches on Tuesday to address 64 new security holes in its software, including a zero-day vulnerability that has already been actively used in attacks. Microsoft’s Most Recent Security Update | In terms of severity, five out of the 64…
0 Comments6 Minutes
Cisco Issues Security Patches for New Vulnerabilities Affecting Several Products
September 13, 2022
Cisco Issues Security Patches on Wednesday to address three security flaws in its products, including a high-severity flaw discovered in NVIDIA Data Plane Development Kit (MLNX DPDK) late last month. Cisco Issues Security Patches, the vulnerability tracked as CVE-2022-28199 (CVSS score: 8.6),…
0 Comments4 Minutes
Rhyno Announces Keynote Presentation at Elevate 2022 – Secure and Protect Stage
September 12, 2022
September 12, 2022, Kitchener, ON – Rhyno Cybersecurity is pleased to announce that Rhyno’s very own Dan Duran, CTO and Risk Advisor, will be presenting as a keynote speaker at Elevate 2022 – Secure & Protect Stage on September 22, 2022. The presentation titled “How to…
0 Comments5 Minutes
JuiceLedger hackers are responsible for recent phishing attacks on PyPI users
September 9, 2022
More information about the operators behind the first-known phishing campaign has surfaced by JuiceLedger Hackers, specifically aimed at the Python Package Index (PyPI), the programming language’s official third-party software repository. SentinelOne and Checkmarx described the group as a…
0 Comments2 Minutes
CIS Critical Security Controls V8: Steps and Template Download
September 7, 2022
With the changing technological landscape, the CIS Critical Security Controls v8 presents a more consolidated approach that replaces CIS Top 20 (V7), which was released some time ago. This article explains what each control is and why it is required. What is the Center for Internet Security and…
0 Comments22 Minutes
A CISO’s Guide to the MITRE ATT&CK Framework
September 6, 2022
The majority of businesses today consider cyber security to be a routine activity. Cyberattacks no longer elicit the same shock and terror that they once did. They are now just part of the job. Despite this natural progression, the volume and severity of cyber attacks continue to grow,…
0 Comments11 Minutes
6 Ways to Avoid C-Level Executive Impersonation Fraud
September 1, 2022
How confident are you that your employees would recognize a phishing email if they received one? Would they be able to identify the difference between an email from a C-level manager and a fake? What if your executive’s email account was hacked? Executive Impersonation Fraud provides cyber…
0 Comments5 Minutes
Sideloading: what is it and how does it work?
August 31, 2022
Sideloading refers to software installation from a third party rather than an authorized source, such as apps not available through official vendors or app stores. This vulnerability gives attackers yet another critical opportunity. Why is a security risk? Third-party applications may not have…
0 Comments4 Minutes
Deepfake: What is It and How to Stay Safe?
August 30, 2022
Separating fact from fiction when surfing the web has become increasingly complex over the past decade. People are less likely to examine the information they consume as their dependence on electronic communication, and virtual collaboration technology has increased. Deepfake cost news exceeding…
0 Comments8 Minutes
10-Step Security Validation Checklist for CISOs
August 29, 2022
Are you confident that your security controls will allow you to relax while you’re away from the office on a well-deserved vacation? More importantly, do you have a solid action plan to ensure a smooth transition? | Security Validation Checklist Whether you’re leaving or returning to…
0 Comments5 Minutes