Enter your Rita login.

Login sucessful

Rita Login portal

Welcome to our Rita portal. Access all your programs and data from anywhere in the world. Access your desktop wherever and whenever you need it. Access to your computer only requires a thin-client and an Internet connection. Once you have connection to our Rita, and logged into your Rita Desktop, it is as though you have full access to your regular machine at your desk in your office.

If you are already a Rita subscriber, please click on the login button below where you will be redirected to a page where you can enter your credentials.

If aren't a Rita subscriber and would like more information, please click on the "ABOUT US" link and enter your contact information and one of our specialists will contact you.

Critical Windows Zero-Day Flaw Warning

The flaw exists because the Windows version of Adobe Type Manager Library improperly handles a specially-crafted multi-master font (called the Adobe Type 1 PostScript format). Type 1 vector outline fonts are a specialized form of PostScript, which contain instructions for building outlines from scaleable lines and curves ...

Apple Fixes Critical WebKit Flaws in iOS, Safari

The most severe of the vulnerabilities is a type confusion bug, CVE-2020-3897, in WebKit. Type confusion flaws are caused because a piece of code doesn't verify the type of object that is passed to it, and uses it blindly without type checking. The flaw could be abused by a remote hacker but user interaction is required to exploit the vulnerability. The vulnerability allows remote hackers to execute arbitrary code on affected installations of Apple Safari ...

APT36 uses Coronavirus to Spread Crimson RAT

Previous APT36 campaigns mainly relied on spear phishing and watering hole attacks to gain its foothold on victims. This most recent phishing email attaches a malicious macro document that targets vulnerabilities in RTF files. This is a high-severity Microsoft vulnerability, which allows hackers to execute Visual Basic script when a user opens a malicious Microsoft Office RTF document. ...

Corona virus Themed Attack Spreads Malware

After the victim opens the specially crafted RTF document, and the Microsoft Word vulnerability is exploited, a malicious file,intel.wll, is dropped into the Microsoft Word startup folder ( %APPDATA%MicrosoftWordSTARTUP ). This serves to persist the malware and prevents the infection from fully activating if run inside a sandbox since a relaunch of Microsoft Word is required for the full execution of the malware. The file, intel.wll, then downloads a DLL file, which serves as the loader for th ...