Borat RAT: A Malicious Package that Combines Remote Access, Spyware, and Ransomware!
August 25, 2022
Cyble, an Atlanta-based cyber risk intelligence firm, discovered a new Remote Access Trojan (RAT) malware. So what distinguishes this Borat RAT malware enough to be named after Sacha Baron Cohen’s comic creation? What are Remote Access Trojans (Borat RAT)? RAT malware typically assists…
0 Comments6 Minutes
What You Should Know About Smishing
August 24, 2022
Smishing, the use of text messaging to trick individuals into disclosing critical personal information, is on the rise. In this article, we’ll look at why smishing is on the rise and what you can do to mitigate the dangers to your company and staff. What exactly is smishing? Smishing is a…
0 Comments6 Minutes
Phishing Method for Bypassing MFA Discovered using WebView2
August 23, 2022
Phishing Method Using the Microsoft WebView2 software, a security researcher has devised a new phishing tactic. This new approach can bypass MFA and steal login cookies, posing significant threats to the organization and individual users. Phishing Method was discovered by security researchers,…
0 Comments6 Minutes
What is a Managed Security Operations Center (SOC)?
August 22, 2022
A Security Operations Center (SOC) is critical to the effectiveness of an organization’s security posture. Security Operations Center | This article discusses the advantages of using a managed SOC rather than setting up and administering your own in-house 24×7 security center. What…
0 Comments9 Minutes
How to End the Culture of Silence in Cyber Security
August 18, 2022
Do you believe everyone in your company would speak out if they suspected phishing or a cyber-attack was imminent? Can you conduct difficult cyber security discussions with your board of directors or management team? Culture of Silence in Cyber Security is more significant than ever. When you add…
0 Comments11 Minutes
The Last Selfie on Earth – Artificial Intelligence and Cyber Security
August 16, 2022
The Last Selfie on Earth | AI-generated selfie photographs show what the last day on Earth may look like. They depict some quite horrific visions of how it all may end. All thanks to DALL-E 2, an artificial intelligence picture generator. But what about AI in cyber security? The Last Selfie on…
0 Comments6 Minutes
This Ransomware Exploits RDP Weaknesses to Get Access to Networks
August 15, 2022
The new joint Cyber Security Advisory (CSA) of the FBI, Cyber Security Infrastructure Security Agency (CISA) and other law enforcement agencies warned that the MedusaLocker ransomware was primarily seen in May 2022 exploiting Remote Desktop Protocol (RDP) configurations to access victims’…
0 Comments4 Minutes
10 Cyber Security Tips and Resources for Small Business
August 11, 2022
Digital information theft has surpassed physical theft as the most commonly reported fraud. Businesses, regardless of their size, must have a cyber security plan in place to protect their own operations, their customers and their data from the growing cyber security threats. Cyber Security Tips…
0 Comments6 Minutes
A Day in the Life of a SOC Cyber Security Analyst
August 10, 2022
Security Analysts are essential members of Rhyno’s Security Operations Centre (SOC), serving as a virtual extension of our client’s in-house teams. SOC Analysts oversee and monitor a variety of detection systems in order to discover, investigate, and respond to threats around the…
0 Comments11 Minutes
CEO Fraud Attacks | 4 Most Common cases & how to Avoid Them
August 9, 2022
In today’s cyber environment, no one is safe, especially executives. CEO Fraud Attacks are becoming more widespread, with attackers routinely sending phishing emails to a company’s employees, impersonating the CEO in order to trick them into transferring money or revealing important…
0 Comments8 Minutes