EHA
Microsoft Defence Report

Microsoft Defence Report – Hackers Highly Target Publicly-Disclosed Zero-Day Vulnerabilities

Microsoft issues a warning about a rise in the use of publicly revealed zero-day exploits by threat actors in their attacks. The researchers noted a shortening of the period between the disclosure of a vulnerability...
Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools

Black Basta Ransomware Ties With FIN7 Hackers To Deploy Custom Hacking & Evasion Tools

There is evidence found pointing to the connection between FIN7 (aka Carbanak), a financially motivated hacking group, and the Black Basta ransomware gang.  The cybersecurity researchers at Sentinel Lab conducted an analysis in which they...
What You Need To Know About IP Address Management Systems

What You Need To Know About IP Address Management Systems

By 2023, the number of gadgets connected to IP networks will be three times more than the global population, according to statistics on Cisco. With more devices added to networks, managing internal IP networks...
Access Control

What is Access Control and its Importance in Cyber Security?

Are you wondering what access control is? Then here, you will get the answer. This is the security technique that minimizes the risk of the organization in a computing environment. Access control can work...
D-Link Critical Flaw Let Attackers Execute Arbitrary Code And Obtain Sensitive Information

D-Link Critical Flaw Let Attackers Execute Arbitrary Code And Obtain Sensitive Information

Cisco Talos, the threat intelligence research team of Cisco has recently identified and uncovered several critical security flaws in the router of D-LINK, DIR-3040, it's an AC3000-based wireless internet router. By exploiting the detected bugs,...
Dangerous Malware Attack

10 Different Types of Dangerous Malware Attack and How to Avoid them

Today's topic is basically about types of malware, yes, it's a malicious software which is basically designated to damage, impair, or exploit computers or computer systems. Thus we can say that it is a...
WarXing

What is WarXing in Cyber Security? What are the Benefits?

You might have heard about WarXing; here you will get detailed information about that. WarXing is always searching for Wi-Fi networks because in this hyper-connected world users need to need a stable internet connection....
System Admin of FIN7 Hacking Group

System Admin of FIN7 Hacking Group Sentenced to Ten Years in Prison

Fedir Hladyr, 35, a Ukrainian national, served as a high-level manager and systems administrator for FIN7.  He was arrested in Dresden, Germany, in 2018 at the request of U.S. law enforcement and was extradited...
WRECK DNS

100 Million+ Devices Affected With Critical WRECK DNS Implementation Flaws

JSOF team together with Forescout Research Labs, have revealed a set of nine vulnerabilities related to Domain Name System (DNS) implementations, causing either Denial of Service (DoS) or Remote Code Execution (RCE). This vulnerability set,...
pppd

Data Encryption: Why Is It So Important?

No one would have imagined a few years ago that cybercrime would become such a big concern as it is today. Billions of attacks are launched against individual devices and entire company networks each...