EHA
How to Stay Anonymous Online After Connecting Household Devices to the Network?

How to Stay Anonymous Online After Connecting Household Devices to the Network?

For most people, anonymity is a very important term. But staying anonymous on the web these days seems to be a proper job. Not to mention, an almost impossible one. Why? Well, there are...

Heavily Obfuscated Malware Campaign using Weaponized PowerPoint Files to Drop Lokibot & Azorult

A new malware campaign utilizes PowerPoint files to deliver the Lokibot info stealer or Azorult remote access trojan. Security researchers from Appriver spotted the malware campaign that includes weaponized PowerPoint files. PowerPoint Malware Infection Chain The infection...
vBulletin

vBulletin Forum Software Silently Fixed Unrevealed Critical Vulnerability – Update Now!!

Recently, the vBulletin project developers have released a patch for the vulnerability in vBulletin 5 Connect versions prior to 5.5.2. vBulletin is popular software that is written in the PHP programming language and used...
Undersea Internet cables

Russian Agents Reportedly Tapping on Undersea Internet cables that Take Entire Countries Offline

Russian Intelligence agents sent to Ireland to inspect the undersea internet cables that establish a connection between Europe and North America. The news is alarming as Russia may carryout new cyber-espionage operations by tapping the...

New 5ss5c Ransomware Attacks Windows Computer Encrypts Only Selected Files and Stop Database-related Services

A new ransomware strain dubbed 5ss5c encrypts only certain files and stops database-related services and processes. 5ss5c ransomware believed to be developed by threat actors behind Satan, DBGer, Lucky and Iron ransomware. The threat actors behind...
xHunt Campaign

xHunt Campaign Use Organization’s Webpage as Watering Hole to Steal Customer Login Details

xHunt campaign knows to be active since July 2018 and they target the transportation and shipping organizations based in Kuwait. The attack campaign named xHunt, because they used the name of the tools from the...

Imminent Monitor – A RAT That Allow Hackers to Gain Full Control of the...

Researchers from Palo Alto Networks break down the illegitimate remote access tool "Imminent Monitor" that allows an attacker to gain full control of the Windows operating system and windows server. There are 65,000 samples of...
Microsoft Defence Report

Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities

Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks. The researchers noted a shortening of the period between the disclosure of a vulnerability...

Google Chrome has Restored ‘Close Other Tabs’ & Fixed Severe Bluetooth Vulnerability

Google has released a new stable channel update chrome 78.0.3904.108 for Windows, Mac, and Linux operating systems. The release covers 5 security fixes and restored Close other tabs option. Chrome 78 removed options such as...
Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Hackers spear-phishing business professionals on LinkedIn with fake job offers and infecting them with malware warns eSentire. eSentire, a leading cybersecurity solutions provider, is warning enterprises and individuals to beware of a new spear-phishing attack...