EHA
Home Search

RAT - search results

If you're not happy with the results, please do another search
New Security Vulnerability Let Attackers Microsoft Corporate Email Accounts

New Security Vulnerability Let Attackers Microsoft Corporate Email Accounts

A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks. Security researcher Vsevolod Kokorin,...
Beware of Weaponized PDFs that Deliver NetSupport RAT

Beware of Weaponized PDFs that Deliver NetSupport RAT

The notorious cybercriminal group Rogue Raticate, also known as RATicate, has resurfaced with a new campaign targeting enterprises. This group, active for several years, is...
Empire Market Founders Charged for Operating $430 Million Dark Web Marketplace

Empire Market Founders Charged for Operating $430 Million Dark Web Marketplace

Two men have been charged in federal court in Chicago with operating “Empire Market,” a dark web marketplace that enabled users to anonymously buy...
NHS Ransomware Attack Leads to Cancellations of 800+ Operations

NHS Ransomware Attack Leads to Cancellations of 800+ Operations

A ransomware cyber attack targeted Synnovis, a pathology laboratory that processes blood tests for several NHS organizations, primarily in southeast London. The attack has...
Arid Viper Android Apps Exfiltrate Login

Arid Viper Weaponizing Android Apps To Exfiltrate Login Details

Arid Viper APT Group has targeted Android users in the Middle East with five campaigns since 2022. These campaigns used trojanized apps impersonating legitimate...
CISA Urges Administrators To Review Newly Released Six ICS Advisories

CISA Urges Administrators To Review Newly Released Six ICS Advisories

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a call to action for administrators and security professionals to review six newly released Industrial...
Researchers Detailed ValleyRAT Password Stealing Techniques

Researchers Detailed ValleyRAT Password Stealing Techniques

Hackers use RATs to get unauthorized access and full control of the victim's computer and all its functionalities and enable other malicious abilities. They allow...
Mozilla’s 0Day Investigative Network, Next Generation Bug Bounty Program

Mozilla’s 0-Day Investigative Network, Next Generation Bug Bounty Program

Generative artificial intelligence (GenAI) is reshaping our world, from streamlining work tasks like coding to helping us plan summer vacations. As we increasingly adopt...
RansomHub Raas Emerges As The Most Largest Ransomware Group Operating

RansomHub Raas Emerges As The Most Largest Ransomware Group Operating

The lucrative business model and the simplicity of running Ransomware-as-a-Service (RaaS) are driving rapid evolution and adoption. Threat actors go for RaaS as it eliminates...
Hackers Weaponize Authentication Tools To Deliver NiceRAT Malware via Botnet

Hackers Weaponize Authentication Tools To Deliver NiceRAT Malware via Botnet

Botnets, traditionally used for DDoS attacks with malware like Nitol, are now being built with malware capable of data exfiltration and installing additional malware,...

Managed WAF

Website

Latest News