Rhino Security Labs

Technical Blog

Abusing Microsoft Word Features for Phishing: “subDoc”

Hector Monsegur
January 2, 2018

At Rhino Security Labs, we regularly dedicate time and resources towards developing techniques to bypass and evade various security systems, including email security and antivirus systems. The ubiquity of Office makes them an ideal target for phishing and penetration testing campaigns….

Read more

Common Azure Security Vulnerabilities and Misconfigurations

Amazon Key Security: CloudCam Subject to Disruption Attacks

Penetration Testing in the AWS Cloud: What You Need to Know

Benjamin Caudill

In previous posts, we have covered a range of AWS (Amazon Web Services) security research topics, including attacking S3 buckets and compromising AWS environments. In this article, we’ll be walking through what you need to know when penetration testing your AWS service….

Read more