EHA
Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Researchers uncovered an infamous and widely distributed malware Emotet, now targeting Windows users by employing a malicious Excel File after six months after its last activity. Emotet is considered a kind of malware family among the...
Hackers Hide IMalware in PNG Files

Hackers Hide Information-Stealing Malware in PNG Files Using Steganography

Experts at Avast, who built on the discoveries of ESET, the first to notice and report on the threat group known as “Worok”, conceals malware within PNG images to silently infect victims' computers with...
29 Weaponized Python PyPI Packages Aimed to Infect Developers With Malware

29 Weaponized Python PyPI Packages Aimed to Infect Developers With Malware

The Python Package Index (PyPI) has been found to contain 29 potentially malicious packages. In most of these cases, you will find that the obfuscated code drops an info-stealer called "W4SP" on infected machines. Others...
Penetration Testing Phases

Path To Pentest Guide : 10 Best Penetration Testing Phases, Lifecycle, Methods – 2023

Penetration Testing Phases involves a various Methods, phases, lifecycle and scope to prepare a best checklist to perform the quality penetration operations. Here we have created a complete Penetration Testing Guide with detailed step...
Malware Hijack Chrome Browser

New ChromeLoader Malware Hijack Chrome Browser to Steal Credentials

There is a malicious Chrome browser extension known as ChromeLoader that classified as a pervasive browser hijacker caught that modifies the browser settings to redirect users' traffic to a malicious websites and stealing credentials.. After...
Microsoft Defence Report

Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities

Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks. The researchers noted a shortening of the period between the disclosure of a vulnerability...
Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools

Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools

There is evidence found pointing to the connection between FIN7 (aka Carbanak), a financially motivated hacking group, and the Black Basta ransomware gang.  The cybersecurity researchers at Sentinel Lab conducted an analysis in which they...
Top 11 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2022

Top 11 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2022

We all know very well that getting or gathering any information by using various tools become really easy. In this article, we have discussed various OSINT tools, as if we search over the internet,...
What You Need To Know About IP Address Management Systems

What You Need To Know About IP Address Management Systems

By 2023, the number of gadgets connected to IP networks will be three times more than the global population, according to statistics on Cisco. With more devices added to networks, managing internal IP networks...
Access Control

What is Access Control and its Importance in Cyber Security?

Are you wondering what access control is? Then here, you will get the answer. This is the security technique that minimizes the risk of the organization in a computing environment. Access control can work...
Website