EHA
Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Severe Security Vulnerabilities in the Samsung Phones Let Hackers to Launch Remote Attacks

Recently, the security researchers detected a new security vulnerability in the Samsung Phones Find My Mobile app, allow hackers to Perform remote attacks.  This security vulnerability is quite severe as it enables the threat actors...
Google Docs Bug Let Hackers Hijack Screenshots

Google Docs Bug Let Hackers Hijack Screenshots

Google has mentioned a flaw that has taken place recently in its feedback tool, and Google affirmed that there is a critical bug that is continuously compromising all the sensitive files of users. The Google...
High-Severity Chrome Bugs Allow Hackers to Compromise the Browser – Update Now!!

High-Severity Chrome Bugs Allow Hackers to Compromise the Browser – Update Now!!

Google released a new Chrome 87.0.4280.88 update for Windows, Mac and Linux with the fixes of high severity vulnerabilities that allow attackers to take over the Brower. However, the experts affirmed that an attacker could...
types Malware Attack

10 Different Types of Most Dangerous Malware Attack in 2024

Introduction : Today's topic is basically about types of malware, yes, it's malicious software that is basically designated to damage, impair, or exploit computers or computer systems. Thus we can say that it is a...
ZenRAT Malware Delivered Through Fake Bitwarden Installation Packages

ZenRAT Malware Delivered Through Fake Bitwarden Installation Packages

According to the recent findings by Proofpoint, a new malware called ZenRAT has been discovered. This malware is being spread via fraudulent download packages disguised as Bitwarden installations. This malware primarily targets Windows users and...
Flaw in Acer Laptops

New Flaw in Acer Laptops Let Attackers Disable Boot Protection

Experts from Acer observed multiple Acer laptop models have vulnerabilities that might let hackers disable the ‘Secure Boot’ function and security checks to install malware. The vulnerability, tracked as CVE-2022-4020 (CVSS score of 8.1), was...
Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Hackers spear-phishing business professionals on LinkedIn with fake job offers and infecting them with malware warns eSentire. eSentire, a leading cybersecurity solutions provider, is warning enterprises and individuals to beware of a new spear-phishing attack...
Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Hackers Actively Exploiting a Critical Oracle WebLogic Vulnerability (CVE-2020-14882)

Recently, many hackers have started investigating all the server those are using the Critical Oracle WebLogic. It is vulnerable to a decisive flaw that enables the threat actors to control the system with limited...
Valak Malware Attack Microsoft Exchange Servers To Steal Enterprise Network Credentials

Valak Malware Attack Microsoft Exchange Servers To Steal Enterprise Network Credentials

Researchers uncovered a sophisticated malware named "Valak" targets Microsoft exchange servers to steal enterprise network credentials, stealing sensitive data, damage the brand reputation, and more. Valak was initially observed as a malware loader, and it...
Russian Hacker Sentenced to Eight Years in Prison for Role in $100 Million Botnet Scheme

Russian Hacker Sentenced to Eight Years in Prison for Role in $100 Million Botnet...

Recently, a U.S. judge has sentenced a Russian national to eight years in prison for stealing all personal and financial data through a botnet conspiracy that intended to make a predicted $100 million. The Russian...

Managed WAF

Website

Latest News