February 2025

Hidden Cyber Threats: Why 70,000 Businesses Disappeared
Monthly Newsletter

Welcome to Right Hand Technology Group's Monthly Cyber Bytes!

Each month, we’ll keep you at the forefront of cybersecurity trends, highlight best practices in IT management, and explore emerging technologies like AI. With cyber threats constantly evolving, staying informed is key to protecting your business. Let’s work together to safeguard what matters most — your data, your operations, and your peace of mind.

Why Security Experts Are Worried About This New "Rockstar" Phishing Strategy

In a disturbing trend, cybercrime is becoming a subscription service.

 

The latest threat?

 

Rockstar 2FA, a sophisticated phishing kit that’s turning amateur criminals into master hackers for the price of a gaming console.

 

Read more

Why Your Biggest Security Threat Might Be Hiding in Plain Sight

In the shadowy corners of the internet, cyber attackers aren’t just evolving – they’re revolutionizing their craft.

 

Over the past quarter alone, 70,000 businesses have vanished from the digital landscape, leaving behind a stark warning for those who remain.

 

The most troubling aspect? Most victims never saw the threat coming.

 

Read more

New Threat: Why Clicking Nothing Could Cost You Everything

In the murky world of cybercrime, a new player has emerged that’s keeping security experts awake at night. The Russian RomCom APT group, also known as Storm-0978 and Tropical Scorpius, has mastered something terrifying: they don’t need you to click anything to compromise your system.

 

Their sophisticated attacks have cast a long shadow over the cybersecurity landscape, particularly for small and medium-sized businesses that often lack the resources to defend against such advanced threats.

 

Read more

How Overlooked Digital Assets Like Expired Domains Fuel Cyberattacks

When thinking about cybersecurity, businesses often focus on the most obvious threats: malware, ransomware, and data breaches. However, one growing risk is often overlooked: expired domains.

 

Expired domains are quickly becoming a critical vulnerability for cybercriminals to exploit. Once a domain expires, it becomes available for re-registration, and attackers have found ways to infiltrate systems, launch sophisticated phishing campaigns, and steal sensitive data.

 

Read more

Our Blog

Unlocking Co-Managed IT Services for Small Business: When and Why It Matters 

Unlocking Co-Managed IT Services for Small Business: When and Why It Matters 

 Introduction  There’s no shortage of pressure on small and mid-sized businesses—especially when tech keeps…

Coinbase Data Breach Exposes Insider Threat Vulnerabilities

Coinbase Data Breach Exposes Insider Threat Vulnerabilities

Coinbase Data Breach: Insider Threats Lead to $20 Million Extortion Attempt – Key Lessons…

How to Use Perplexity: A Small Business Guide 
AI

How to Use Perplexity: A Small Business Guide 

How to Use Perplexity: A Small Business Guide  Introduction: Unlocking AI for Small Business…