EHA
Patch Management

Patching On Time, Thwarts Cybercrime – Security Patch Management Guide

"It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it," says Stephane Nappo, Global Head of Information Security for Société Générale International Banking Pole. Although a cyber incident...
Guarding your Stored and Traded Crypto Assets

Guarding your Stored and Traded Crypto Assets

Cryptocurrencies are digital currencies built upon a blockchain network that have real values measured against regular fiat currencies and can be used as regular money in storage, investments, and even payments. They mostly used...
xHunt Campaign

xHunt Campaign Use Organization’s Webpage as Watering Hole to Steal Customer Login Details

xHunt campaign knows to be active since July 2018 and they target the transportation and shipping organizations based in Kuwait. The attack campaign named xHunt, because they used the name of the tools from the...
Apple Security Update

Apple Released Security Update – Several Bugs are Fixed That Affected iOS, iCloud, Safari,...

Well, the security update for Xcode, it's an integrated development atmosphere for the tech giant Apple's macOS, including a suite of software development tools produced by Apple for creating software for macOS, iOS, iPad,...
Chrome Zero-Day Bug

New Google Chrome Zero-Day Bug Actively Exploited in Wild– Emergency Update!

Google released new security updates for actively exploited Chrome zero-day vulnerability exploit in the Wild, which allows attackers to execute an arbitrary code to take complete control of the system remotely. Google released Chrome 114.0.5735.106 for Mac and...
human trafficking

Hackers Continue To Use Popular Online Platforms To Recruit Victims

Nowadays, the Federal Bureau of Investigation (FBI) is advising the public to remain alert of the threat professed by various criminals who attempt to traffic individuals by force, fraud, or coercion through well-known social media and dating...
Exchange Server Vulnerabilities

Kr00k – Serious Wi-Fi Vulnerability that Affects Billions of Wi-Fi Devices

Kr00k a serious vulnerability in Broadcom and Cypress Wi-Fi chips affects billions of client devices, Wi-Fi Access points and routers. The vulnerability was discovered by ESET, tracked as CVE-2019-15126, it allows an attacker to decrypt...
Malicious Code Via RDP

Researchers Discovered a New Method that Let Hackers to Run Malicious Code Via RDP

Security researchers from Cymulate discovered a new hidden malware defense evasion technique that let hackers run malicious code using Microsoft’s Remote Desktop Protocol (RDP) using the DLL Side-Loading technique. While analyzing MSTSC and RDP they...
types Malware Attack

10 Different Types of Most Dangerous Malware Attack in 2024

Introduction : Today's topic is basically about types of malware, yes, it's malicious software that is basically designated to damage, impair, or exploit computers or computer systems. Thus we can say that it is a...
GTP

GTP Mobile Internet Protocol Bugs Let Hackers Attack 4G and 5G Networks Mobile via...

Researchers identified various vulnerabilities in connection with the GPRS Tunnelling Protocol (GTP), it is mostly managed by mobile network operators (MNOs). The firm stated that the GTP allows the hacker to attack all 4G...

Managed WAF

Website

Latest News