EHA
Home Search

HTTPS - search results

If you're not happy with the results, please do another search
Hackers Employed DNS-over-HTTPS

Chinese Hackers Employed DNS-over-HTTPS for Linux Malware Communication

ChamelGang, a sophisticated threat actor believed to be based in China, has been using different tools for intrusions, as identified by the security researchers...
Billbug

Billbug – APT Hackers Group Attack Digital Cert Authority to Intercept The HTTPS...

Researchers uncovered that State-Sponsors APT hackers called "Billbug" attacked and compromise the digital certificate authority in multiple Asian countries along with other government and...
HTTPS DDoS attacks

Largest HTTPS DDOS Attack Recorded By Google with 46 Million Requests Per Second

It was reported that Google has been targeted with the largest DDoS attack in history against one of its customers. An attack on one...
Largest HTTPS DDoS Attack

Largest HTTPS DDoS Attack on Record – 26 million Request per Second

Recently, Cloudflare noticed and mitigated a 26 million request per second DDoS attack, the largest HTTPS DDoS attack on record. This attack targeted customer...
DeathStalker APT Hackers Launch PowerPepper Malware That Leveraged DNS over HTTPS as a C2 Channel

DeathStalker APT Hackers Launch PowerPepper Malware That Leveraged DNS over HTTPS as a C2...

Researchers have recently detected a new malware "PowerPepper" activity from DeathStalker. It is the advanced persistent threat (APT) actor, recognized for contributing hacking-for-hire services.  The...
Firefox 73 Released  – Added NextDNS in Firefox DNS over HTTPS & Several Security Vulnerabilities are Fixed

Firefox 73 Released – Added NextDNS in Firefox DNS over HTTPS & Several...

Mozilla released Firefox 73 with several security patch updates for the vulnerabilities that affected the previous version of Firefox. Firefox 73 addressed and fixed 6...
GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To...

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report that highlights the growing, widespread use and potential of Web3 user...
C2A Security’s EVSec Risk Management and Automation Platform Gains Automotive Industry Favor as Companies Pursue Regulatory Compliance

C2A Security’s EVSec Risk Management and Automation Platform Gains Automotive Industry Favor as Companies...

In 2023, C2A Security added multiple OEMs and Tier 1s to its portfolio of customers, successful evaluations, and partnerships such as BMW Group, Daimler...
Apple ID “push bombing”

Apple ID “push bombing” Attack Targeting Apple Users to Steal passwords

Apple users are falling prey to a sophisticated phishing campaign designed to hijack their Apple IDs through what's known as a “push bombing” or...
Hackers Using Weaponized Virtual Hard Disk Files to Deliver Remcos RAT

Hackers Using Weaponized Virtual Hard Disk Files to Deliver Remcos RAT

Hackers have been found leveraging weaponized virtual hard disk (VHD) files to deploy the notorious Remote Control Software (RAT), Remcos. This method marks a...

Managed WAF

Website

Latest News