EHA
Home Search

APT - search results

If you're not happy with the results, please do another search
U.S. and UK Impose Sanctions Chinese Hackers

U.S. and UK Impose Sanctions on APT 31 Chinese Hackers for Cyber Attacks

In a significant move to counter cyber threats, the United States and the United Kingdom have imposed sanctions on a group of China-linked hackers...
Chinese APT Hackers Exploits Government Web & Exchange Servers

Chinese APT Hackers Exploits Government Web & Exchange Servers

A new Advanced Persistent Threat (APT) campaign, dubbed Earth Krahang, has emerged with a focus on infiltrating government entities across the globe. This campaign,...
Malware Families Adapting To COM Hijacking Technique To Achieve Persistence

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on...
In the Crosshairs: Addressing Emerging Threats Through Adaptive Software Development and Cybersecurity Strategies

In the Crosshairs: Addressing Emerging Threats Through Adaptive Software Development and Cybersecurity Strategies

In today's interconnected world, the threat landscape of cybersecurity is more dynamic and sophisticated than ever. Organizations face an array of challenges from malicious...
Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis

Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis

In a groundbreaking advisory, cybersecurity agencies from the Five Eyes intelligence alliance have detailed the sophisticated tactics, techniques, and procedures (TTPs) employed by APT29,...
Russian APT Group Using HTTP-Shell to Attack Government Entities

Russian APTs Employ HTTP-Shell to Attack Government Entities

Recently, Cluster25, a threat intelligence firm, uncovered a spear-phishing campaign dubbed "The Bear and the Shell," specifically targeting entities critical of the Russian government...
Blackwood APT Hackers Use DLL Loader to Escalate privilege & Install backdoor

Blackwood APT Hackers Use DLL Loader to Escalate privilege & Install backdoor

The recent discovery of a new DLL loader associated with the notorious Blackwood APT group has sent shivers down the spines of cybersecurity professionals.  This...
In the Crosshairs: Addressing Emerging Threats Through Adaptive Software Development and Cybersecurity Strategies

In the Crosshairs: Addressing Emerging Threats Through Adaptive Software Development and Cybersecurity Strategies

In today's interconnected world, the threat landscape of cybersecurity is more dynamic and sophisticated than ever. Organizations face an array of challenges from malicious...
APT Hackers Exploiting Ivanti Connect Secure VPN New Zero-Day Flaw in the Wild

APT Hackers Exploiting Ivanti Connect Secure VPN New Zero-Day Flaw in the Wild

Hackers exploit Zero-Day flaws in VPNs as these vulnerabilities are unknown to the software vendor, making them difficult to patch immediately. This can be particularly...
Transfer Learning in Computer Vision: Adapting Pre-trained Models for New Tasks

Transfer Learning in Computer Vision: Adapting Pre-trained Models for New Tasks

To simplify and speed up data-backed software solutions, specially trained machine models are used. However, it is challenging and time-consuming to train these models...

Managed WAF

Website

Latest News