EHA
Home Search

Confluence - search results

If you're not happy with the results, please do another search
Kinsing Malware Targets Kubernetes

Kinsing Malware Uses Unique Techniques to Breach Kubernetes Clusters

By exploiting vulnerabilities in container images and misconfigured PostgreSQL containers, Kinsing malware is now actively infiltrating Kubernetes clusters. Threat actors are not unusual in using...
Microsoft Defence Report

Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities

Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks. The researchers noted a...
MyDeal Hacked – Over 2.2M Users Data Advertised For Sell on a Hacker Forum

MyDeal Hacked – Over 2.2M Users Data Advertised For Sell on a Hacker Forum

MyDeal, a subsidiary of the Woolworths Group disclosed a data breach that impacted more than 2.2 million customers. Reports say the hacker was attempting...
CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

The CISA has recently published a joint CSA with the NSA and the FBI about the top CVEs that are exploited by the threat...
Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute of Malicious Code

Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute Malicious Code

Atlassian revealed a critical security flaw in Bitbucket Server and Data Center that allows attackers to execute malicious code on vulnerable instances. The critical...
Sophos Zero-day Flaw by Chinese Hackers to Implement Backdoor

Sophos Zero-day Flaw Exploited by Chinese Hackers to Implement Backdoor

The Chinese hackers exploited Sophos firewall's zero-day flaw to target South Asian companies and breached cloud-hosted web servers. Previously, Volexity noticed a sophisticated attack against...
Critical Flaws In The Atlassian Project

Critical Flaws In The Atlassian Project Let Attackers Take Over Control Of Accounts And...

Check Point Research (CPR) revealed critical vulnerabilities in the Atlassian project that allow attackers to take over control of accounts and Atlassian apps through...
Lebanese Cedar APT group Attack ISP Companies Worldwide

Lebanese Cedar APT group Attack ISP Companies Worldwide

Recently, the Clearsky researchers have joined the Lebanese Cedar group in a cyber espionage campaign that has targeted several companies worldwide. According to the...
Ways Defense Contractors Can Improve Cybersecurity and Compliance

Ways Defense Contractors Can Improve Cybersecurity and Compliance

The discovery of information leaks of sensitive data has prompted lawmakers to amend policies and oversight protocols that are kept in place to protect...
Hackers Are Exploiting These Web Application Vulnerabilities to Install Persistent Backdoor – NSA

Hackers Are Exploiting These Web Application Vulnerabilities to Install Persistent Backdoor – NSA

The security agencies of the US and Australia, NSA (National Security Agency), and ASD (Australian Signals Directorate) have issued a joint security announcement that...