Apple Opens Private Cloud Compute for Security Research

In June, Apple unveiled its Private Cloud Compute (PCC), promoting it as the "most advanced security system ever built for cloud AI computing on a large scale." This innovation allows the processing of demanding AI tasks in the cloud while maintaining user privacy. Now, Apple has made the PCC…


0 Comments3 Minutes

Gophish Toolkit Delivers Remote Access Trojans

Gophish Toolkit Delivers Remote Access Trojans

A new phishing campaign has emerged, primarily targeting Russian-speaking consumers. The attackers are leveraging Gophish, an open-source toolkit, to distribute DarkCrystal RAT (DCRat) and a new remote access trojan called PowerRAT. You might be interested in: 7 Data Breach Disasters – Lessons for…


0 Comments4 Minutes

Chinese Hackers APT41 Attack Gambling Companies

Chinese Hackers APT41 Attack Gambling Companies

Chinese state-backed hacking group APT41, also known as Brass Typhoon, Earth Baku, Wicked Panda, or Winnti, carried out a sophisticated cyber attack targeting the gambling and gaming sector. According to Ido Naor, co-founder and CEO of Security Joes, the hackers managed to infiltrate a company’s…


0 Comments4 Minutes

North Korean IT Workers Extort Western Firms

North Korean IT Workers Extort Western Firms

North Korean IT Workers, who have been known to secure jobs in Western companies under false identities, are stepping up their tactics. Previously focused on stealing intellectual property, they are now extorting their employers by demanding ransoms to prevent the release of stolen data. This new…


0 Comments5 Minutes

Cicada3301 Ransomware: Inside the Affiliate Scheme

Cicada3301 Ransomware: Inside the Affiliate Scheme

Cybersecurity experts have recently accessed the affiliate panel of Cicada3301, a new ransomware-as-a-service (RaaS) operation. This access has allowed them to gain more information about the platform, which is still in its early development phase. You might be interested in: 7 Data Breach…


0 Comments4 Minutes

Hackers Exploit EDRSilencer to Evade Security

Hackers Exploit EDRSilencer to Evade Security

Trend Micro has identified that cyber attackers are attempting to use the open-source tool EDRSilencer in their operations. They're repurposing it to avoid being spotted by security systems. You might be interested in: 7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month What is…


0 Comments3 Minutes

Malware Campaign Deploys DarkVision RAT via PureCrypter

Malware Campaign Deploys DarkVision RAT via PureCrypter

Cybersecurity researchers have recently identified a new malware campaign that is actively spreading a remote access trojan (RAT) known as DarkVision RAT. The malicious actors behind this campaign are utilizing a malware loader called PureCrypter to deliver the RAT to unsuspecting victims. This…


0 Comments9 Minutes

7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month

7 Data Breach Disasters – Lessons for Cybersecurity Awareness Month

Celebrating Cybersecurity Awareness Month! Hi everyone, I’m Dan Duran, and since it’s Cybersecurity Awareness Month, I want to shine a light on some of the biggest hacks in history. These stories not only reveal how vulnerable we can be but also teach essential security concepts every developer and…


0 Comments6 Minutes

Fortinet Flaw Triggers CISA Alert, Patches from Cisco, Palo Alto

On Wednesday, the United States Cybersecurity and Infrastructure Security Agency (CISA) flagged a major security vulnerability affecting Fortinet devices by adding it to the Known Exploited Vulnerabilities (KEV) database. This action was taken due to confirmed instances of the vulnerability being…


0 Comments5 Minutes

Ivanti CSA Vulnerabilities in Active Exploitation

Ivanti CSA Vulnerabilities in Active Exploitation

Ivanti has alerted its customers to three new security flaws affecting its Cloud Service Appliance (CSA). These vulnerabilities are now being actively exploited by attackers. You might be interested in: Serious Security Flaw in WordPress LiteSpeed Cache Plugin The Utah-based software company…


0 Comments4 Minutes

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Privacy Preference Center