Penetration Testing Process and Guide
October 17, 2022
Penetration testing is a popular and successful method for identifying security flaws in an organization’s IT infrastructure. It involves performing a vulnerability assessment of your IT infrastructure by “ethically hacking” any system, network or application to simulate how a…
0 Comments17 Minutes
Microsoft releases enhanced mitigations for unpatched Exchange Server vulnerabilities
October 13, 2022
Microsoft announced on Friday that it had made additional improvements to the mitigation mechanism available to thwart exploitation efforts against the recently discovered unpatched security weaknesses in Exchange Server. To that end, Microsoft updated the blocking rule in IIS Manager from…
0 Comments3 Minutes
ALERT: Critical Vulnerability on FortiGate and FortiProxy, According to Fortinet
October 11, 2022
Fortinet has notified its customers of a security weakness affecting FortiGate firewalls and FortiProxy web proxies, which can allow attackers to execute unauthorized operations on vulnerable systems. | Vulnerability on FortiGate Vulnerability on FortiGate | The significant bug, identified as…
0 Comments3 Minutes
Why companies need EDR & MDR for complete Network Protection
October 5, 2022
Endpoint devices, including desktop computers, laptops, and mobile phones, allow users to connect to company networks and utilize their resources daily. However, these devices broaden the attack surface and expose the organization to aggressive attacks and data breaches. MDR for complete Network…
0 Comments8 Minutes
ALERT: Unpatched Microsoft Exchange Zero-Day Actively Exploited
October 4, 2022
Security experts are warning about previously unknown holes in fully patched Microsoft Exchange servers that are being exploited in real-world attacks by malicious actors to accomplish remote code execution on afflicted computers. | Unpatched Microsoft Exchange Zero-Day Unpatched Microsoft…
0 Comments5 Minutes
Rhyno Cybersecurity Speaking at the Canadian Society of Iranian Engineers and Architects
October 3, 2022
October 3, 2022 – Kitchener, ON – Rhyno Cybersecurity is pleased to announce that CTO and Risk Advisor, Dan Duran, will be a keynote speaker at the Canadian Society of Iranian Engineers and Architects (Mohandes) this coming October 5, 2022. The presentation titled “Introduction…
0 Comments3 Minutes
40% of Australians’ Personal Information Stolen in Massive Optus Data Breach
October 3, 2022
Optus, Australia’s largest telecommunications company, disclosed last week that personal data from around 10 million users – roughly 40% of the population – was taken in a cyber-attack. Optus Data Breach According to analysts, this is the worst data breach in Australian……
0 Comments9 Minutes
Continuous Security Testing is a Must in Today’s Threat Landscape
September 29, 2022
According to studies, approximately 60% of firms that experience a data breach blame it on a known unpatched vulnerability. Conducting periodic security scans and vulnerability assessments as part of a complete vulnerability management program is one of the best ways to detect weaknesses and…
0 Comments7 Minutes
Hackers Infect Systems with PowerPoint Malware Using Mouseover Trick.
September 28, 2022
PowerPoint Malware APT28 (aka Fancy Bear), a Russian state-sponsored threat actor, has been discovered using a new code execution method that uses mouse movement in decoy Microsoft PowerPoint documents to deploy malware. by Dan Duran
0 Comments3 Minutes
7 Best Incident Response Practices Your Company Should Consider
September 27, 2022
With these seven critical Incident Response Practices, you can ensure that your employees are adequately equipped to deal with cybersecurity attacks. An organization’s practices and policies in reaction to a cyber incident, such as an attack or data breach, are referred to as incident…
0 Comments8 Minutes