Types of insider threats
May 26, 2021
Types of Insider Threats An insider threat is a security risk that originates within the targeted organization. This doesn’t mean that the actor must be a current employee or officer in the organization. They could be a consultant, former employee, business partner, or board member. Insiders have…
0 Comments2 Minutes
Password Theft | Have you been hacked?
May 19, 2021
Password Theft Today, passwords are our modern-day sentry, helping to keep our (technological) properties secure and cyber intruders out. A password should be comprised of a random string of at least eight letters, numbers, and symbols used to create a unique password. Passwords are used in…
0 Comments3 Minutes
Cybersecurity Myths | Threat Actors Use Sophisticated Tools
May 17, 2021
CYBERSECURITY MYTHS! Cyber threat actors are not equal in terms of capability and sophistication and have a range of resources, training, and support for their activities. Cyber threat actors may operate on their own or as part of a larger organization (i.e., a nation-state intelligence program or…
0 Comments3 Minutes
What is OpenVas? | Vulnerability Assessment
May 10, 2021
What is OpenVas? OpenVAS (Open Vulnerability Assessment System) is a software framework of several services and tools offering vulnerability scanning and vulnerability management, free software, and most components are licensed under the GNU General Public License (GPL). Plugins for Open VAS are…
0 Comments2 Minutes
Cybersecurity Investment: Why it is more than important
May 3, 2021
Cybersecurity is an Investment, just look at the Red Numbers you NEED to avoid. Cybersecurity Investment has increased. Ransomware researchers estimate that the average ransom demand increased by 33% since Q4 2019 to approximately $148,700 CAD in Q1 2020 due to the impact of targeted ransomware…
0 Comments3 Minutes
Penetration Testing Vs Vulnerability Assessment
April 30, 2021
Penetration Testing Vs Vulnerability Assessment There is confusion around vulnerability assessment vs penetration testing. This is compounded by unscrupulous security vendors presenting (and pricing) a vulnerability assessment as a penetration test. Aside from poor ROI, this can give an…
0 Comments2 Minutes
Difference between Penetration Testing & Vulnerability Assessment
April 28, 2021
Difference between Penetration Testing & Vulnerability Assessment Vulnerability scans look for known vulnerabilities in your systems and report potential exposures. Penetration tests are intended to exploit weaknesses in the architecture of your IT network and determine the degree to which a…
0 Comments3 Minutes
What is Zero Trust? | Rhyno Cybersecurity
April 28, 2021
What is Zero Trust? Zero Trust operates under the guiding principle “never trust, always verify.” All users, platform providers, and network traffic are treated as potential threats, so additional measures are needed to mitigate risk. It’s not, however, a set of specific tools or a type of…
0 Comments4 Minutes
Malware Attacks | Rhyno Cybersecurity
April 23, 2021
Malware Attacks Malware Attacks are caused by any software intentionally designed to cause damage to a computer, server, client, or computer network. Is a threat to your devices and your cybersecurity. It’s software that cyber attackers develop to gain access or cause damage to a computer or…
0 Comments3 Minutes
Secure Your Industrial Control Stacks, Now!
April 21, 2021
Secure Your Industrial Control Stacks, Now! Secure Your Industrial Control Stacks! Serious Vulnerabilities Found in the OpENer EtherNet/IP Industrial Systems Stack including Denial-of-Service (DoS) attacks, data leaks, and remote code execution. CVE-2020-13556 (CVSS score: 9.8)- An out-of-bounds…
0 Comments3 Minutes