EHA

Latest Cyber Security news

Mimic Ransomware Abuses Windows Search

New Mimic Ransomware Abuses Windows Search Engine to Look Files for Encryption

A new strain of ransomware named Mimic has been uncovered recently by security experts at Trend Micro in June 2022. Mimic takes advantage of...
Critical Realtek SDK Vulnerability

Hackers Launching Millions of Attacks to Exploit Critical Realtek SDK Vulnerability

In the latter half of 2022, a significant number of cyber attacks utilizing a remote code execution vulnerability in Realtek Jungle SDK were reported....
CryptoAPI Spoofing Vulnerability

PoC Exploit Released for Critical CryptoAPI Spoofing Vulnerability in Windows

Akamai researchers have made available a demonstration exploit code for a significant vulnerability in Windows CryptoAPI that was identified by the National Security Agency...
GoTo Hackers Stole

GoTo Says Hackers Stole Customer Data and Encryption Keys

GoTo, formerly LogMeIn Inc., has acknowledged that a threat actor stole an encryption key that gave access to a portion of the backup files that...
FBI Confirms Lazarus Group

FBI: Lazarus Group Is Responsible For $100 Million Harmony Crypto Theft

It has been officially confirmed by the Federal Bureau of Investigation (FBI) that the cyber-attacks on the cryptocurrency exchange, Harmony Horizon, which resulted in...
iOS Zero-Day

Warning! Apple Fixes Actively Exploited iOS Zero-Day on iPhones & iPads

In an effort to ensure the safety and security of its customers, Apple has taken the necessary steps to address a potentially dangerous vulnerability...
Since you are in the industry especially in the network and admin team, you need to know few vulnerabilities such as injection attacks to stay alert from them. Each attack or vulnerability has a different method, most importantly injection-type attacks. to understand that and to take a precaution for...

Top 10 Cyber Security Tools