Rhino Security Labs

Technical Blog

Bypassing Email Security Controls (P1: URL Scanning)

Hector Monsegur

This post will be the first of a series on advanced phishing capabilities and bypassing email security mechanisms.  The focus is on URL analysis and bypassing link scanning capabilities, with Microsoft’s O365 linkscanning filters used…

Cloud Security Risks (Part 1): Azure CSV Injection Vulnerability

Abusing Microsoft Word Features for Phishing: “subDoc”

Don’t be fooled by these common social engineering attacks

Benjamin Caudill

Ever wonder how hackers get a foothold in big corporations who spend millions of dollars on security? Instead of attacking the technology, they often target employees, tricking them into providing access.
Some of these techniques are…