EHA

Latest Cyber Security news

SSNDOB Marketplace Admin Jailed for Selling millions of Americans Data

SSNDOB Marketplace Admin Jailed for Selling millions of Americans Data

In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii Chychasov, a 37-year-old Ukrainian citizen, to an eight-year federal...
Is Your Online Store a Victim of a Carding Attack? Here’s an Action Plan

Is Your Online Store Hacked in a Carding Attack? Here’s an Action Plan to...

Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using carding attacks as we gear up for the holiday...
Google Researchers Find Out How ChatGPT Queries Can Collect Personal Data

Google Researchers Find Out How ChatGPT Queries Can Collect Personal Data

The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and applications. However, this progress also attracts threat actors who actively...
New Android Spyware Employs Various Tatics to Deceive Malware Analyst

New Android Malware Employs Various Tactics to Deceive Malware Analyst

In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of malware, with code obfuscation standing out as a deceptive...
DJvu Ransomware Mimic as Cracked Software to Compromise Computers

DJvu Ransomware Mimic as Cracked Software to Compromise Computers

A recent campaign has been observed to be delivering DJvu ransomware through a loader that pretends to be freeware or cracked software. This ransomware...
Okta Hack customer Data

Okta Hack: Threat Actors Downloaded all Customer Support System Users’ Data

In a pivotal update to the Okta security incident divulged in October 2023, Okta Security has unearthed additional intricacies surrounding the unauthorized intrusion into...
Effective Proactive Measures for Ransomware Attacks

Defend Ransomware Attacks With Top Effective Proactive Measures in 2024

We're currently living in an age where digital threats loom large. Among these, ransomware has emerged as a formidable adversary, disrupting businesses and individuals...
GoTitan Botnet Apache ActiveMQ

GoTitan Botnet Actively Exploiting Apache ActiveMQ Vulnerability

Attackers are exploiting the recently discovered critical security vulnerability tracked as (CVE-2023-46604) affecting Apache ActiveMQ to disseminate the Golang-based botnet GoTitan and the.NET application...
Cybercriminals are Showing Hesitation to Utilize AI When Executing Cyber Attacks

Cybercriminals are Showing Hesitation to Utilize AI When Executing Cyber Attacks

Media reports highlight the sale of LLMs like WormGPT and FraudGPT on underground forums. Fears mount over their potential for creating mutating malware, fueling...
Vigil: Open-source Security Scanner for LLM models like ChatGPT

Vigil: Open-source Security Scanner for LLM Models Like ChatGPT

An open-source security scanner, developed by Git Hub user Adam Swanda, was released to explore the security of the LLM model. This model is...

Managed WAF

Website

Top 10

Network Security Vendors

Best Network Security Vendors for SaaS – 2024

Introduction : Network security for Software as a Service (SaaS) requires a combination of rules, procedures, and technologies to ensure the confidentiality, integrity, and availability...
Web Security Scanners

11 Best Web Security Scanners For Vulnerability Scanning – 2024

Introduction : Web Security Scanners: The world is moving towards digitalization; from small to large, every business has a website running to showcase its services,...
Network Security Companies

10 Best Network Security Companies For CISO – 2024

Introduction : Network security vendors offer a variety of products and services to prevent harm to an organization's computer networks, data, and resources from attackers...
Best Security Solutions for Marketers

Best Security Solutions for Marketers – 2024

Introduction : Marketers play an essential role in today’s market by bridging the gap between the consumer and the organization or product.  In the process of...
Forensic Investigation Tools

10 Best Digital Forensic Investigation Tools – 2024

Introduction : In the area of digital forensics, digital forensic tools are specialized pieces of software and hardware used to look into and analyze data...
A Dictionary attack is one of the ways through which the attackers try to gain access to the keys of the reign. Bad actors take advantage of people using common dictionary words as their passwords. A study has proved that the majority of people like to reuse their passwords or...

Top 10 Cyber Security Tools