EHA
Home Search

malicious - search results

If you're not happy with the results, please do another search
Hackers Using Legitimate Remote Monitoring

Beware That Hackers Using Legitimate Remote Monitoring For Malicious Purposes

A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing and Analysis Center (MS-ISAC)...
VASTFLUX campaign

VASTFLUX – Hackers Exploiting Restricted in-app Environments to Run Malicious Ads

VASTFLUX, a large-scale well-organized, and sophisticated ad fraud operation were recently taken down by cybersecurity researchers at HUMAN Security Inc. On a daily basis, 12...
Beware! Gootkit Loader Malware Using VLC Player to Deliver Malicious Payloads

Beware! Gootkit Loader Malware Using VLC Player to Deliver Malicious Payloads

Trend Micro researchers recently reported that Australian healthcare entities were infected with a Cobalt Strike beacon after a new SEO poisoning campaign has been...
Hackers Using Microsoft-signed Malicious Windows Drivers in Ransomware Attacks

Hackers Using Microsoft-signed Malicious Windows Drivers in Ransomware Attacks

Following a series of cyberattacks, including ransomware attacks, Microsoft recently revoked several Microsoft hardware developer accounts. In a coordinated disclosure, the news came from the...
OnionPoison Chain

OnionPoison – Hackers Distribute Malicious Tor Browser Installer Via Famous YouTube Channel

The cybersecurity experts at Kaspersky Lab have detected an encrypted version of the Windows installer for the Tor Web Browser has been distributed via...
Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute of Malicious Code

Critical Atlassian Bitbucket Server and Data Center Flaw Let Attackers Execute Malicious Code

Atlassian revealed a critical security flaw in Bitbucket Server and Data Center that allows attackers to execute malicious code on vulnerable instances. The critical...
North Korean Hackers Uses Malicious Browser Extension To Steal Emails From Chrome

North Korean Hackers Uses Malicious Browser Extension To Steal Emails From Chrome

Kimsuky, a North Korean hacker group is believed to be hacking the major web browsers with the help of a malicious browser extension, which...
NSA Issued Advisory

NSA Issued an Advisory for System Administrators to use PowerShell for Detecting Malicious Activity

A recent advisory from the National Security Agency (NSA) recommended that system administrators use PowerShell to manage systems. PowerShell is a program that can...
Apple Blocked 1.6M Malicious Apps

Apple Blocked 1.6 Million Malicious Apps from Defrauding Users

Apple says that its App store safety mechanisms blocked $1.5 billion in fraudulent App Store transactions, 1.6 million risky and vulnerable apps, and app...
Microsoft Office Zero-day Vulnerability

New Microsoft Office Zero-day Vulnerability Let Attackers Execute Malicious PowerShell Commands

Security researchers have recently discovered a new zero-day vulnerability in Microsoft Office, resulting in the execution of code when exploited. It is possible to exploit...