EHA
Home computer Security

computer Security

Beware!! State-Sponsored Hackers are using COVID-19 Lures to Steal Google Account Credentials

Beware!! State-Sponsored Hackers are using COVID-19 Lures to Steal Google Account Credentials

State-sponsored hackers are continuously using COVID-19 pandemic to lure users simply to steal the Google Accounts credentials and sensitive data. As the security experts of Google warned globally each and every user and the...
Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2023

Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2023

We all know very well that getting or gathering any information by using various tools becomes really easy. In this article, we have discussed various OSINT tools, as if we search over the internet,...
Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Hackers spear-phishing business professionals on LinkedIn with fake job offers and infecting them with malware warns eSentire. eSentire, a leading cybersecurity solutions provider, is warning enterprises and individuals to beware of a new spear-phishing attack...
What is Malware

What is Malware? Removal and Prevention

Malware is a software or malicious code that is specifically designed for gaining access to an end-user machine or network. Attackers try to steal the data /information, damage devices and for making money by compromising...
Exchange Server Vulnerabilities

Kr00k – Serious Wi-Fi Vulnerability that Affects Billions of Wi-Fi Devices

Kr00k a serious vulnerability in Broadcom and Cypress Wi-Fi chips affects billions of client devices, Wi-Fi Access points and routers. The vulnerability was discovered by ESET, tracked as CVE-2019-15126, it allows an attacker to decrypt...
GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

GDPR & HIPAA Compliance – Key Similarities and Differences in the Compliance Requirements

Introduction Privacy Regulations has for long been a major concern for most businesses processing or dealing with Personal Data. Today, acknowledging the fact that protecting Personal Information or data is essential, many Regulatory and Governing...
Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New Targets

Ransomware Operators Using SystemBC Backdoor with Tor proxy & RAT Futures to Attack New...

SystemBC is a commodity malware sold on undercover marketplaces; ransomware-as-a-service (RaaS) operations are practicing this malware to disguise all kind of malicious traffic and automate ransomware payload that is delivered on the networks of...
Security Researchers Gained Access to Git Repositories of the United Nations

Security Researchers Gained Access to Git Repositories of the United Nations

The security experts of Sakura Samurai have managed to get access to more than 100,000 personal records and credentials belonging to United Nations representatives in just a few hours. The data breach was initially originated...
Ways Defense Contractors Can Improve Cybersecurity and Compliance

Ways Defense Contractors Can Improve Cybersecurity and Compliance

The discovery of information leaks of sensitive data has prompted lawmakers to amend policies and oversight protocols that are kept in place to protect corporate IP (intellectual property) and the nation’s most classified data....
Multiple Flaws With Fortinet FortiWeb WAF Would Allow Attackers to Hack Corporate Networks

Multiple Flaws With Fortinet FortiWeb WAF Would Allow Attackers to Hack Corporate Networks

The cybersecurity researchers of Positives Technologies have detected some severe flaws in the Fortinet FotiWeb web application firewall. According to the security experts, the threat actors could easily hack the corporate networks with these...