EHA
PrintListener Attack

Hackers Use Fingertip Friction Sound To Steal Fingerprints

Researchers have unveiled a new cybersecurity threat that could compromise the integrity of fingerprint authentication systems worldwide. The method, dubbed "PrintListener," exploits the sound of fingertip friction on smartphone screens to infer and reconstruct...
87% of UK Organisations are Vulnerable to Cyberattacks : Microsoft AI Research

87% of UK Organisations are Vulnerable to Cyberattacks : Microsoft AI Research

In a groundbreaking report released by Microsoft, in collaboration with Dr. Chris Brauer of Goldsmiths, University of London, an alarming 87% of UK organizations have been identified as vulnerable to cyberattacks, highlighting a critical...
WARNING: Hackers’ New Favorite Tool – Weaponized SVG Files!

WARNING: Hackers’ New Favorite Tool – Weaponized SVG Files!

Threat actors use SVG files in cyber-attacks because SVGs (Scalable Vector Graphic files) can contain embedded scripts, making them a vector for executing malicious code.  Not only that even the SVG files can also bypass...
Chinese APT Hackers Exploits Government Web & Exchange Servers

Chinese APT Hackers Exploits Government Web & Exchange Servers

A new Advanced Persistent Threat (APT) campaign, dubbed Earth Krahang, has emerged with a focus on infiltrating government entities across the globe. This campaign, active since early 2022, has been linked to a China-nexus...
Cyber Security News Weekly Round-Up

Cyber Security News Weekly Round-Up : Cyber Attacks, Vulnerabilities, Threats & New Cyber Stories

With our weekly cybersecurity news summary, explore and learn about the most recent developments in the cybersecurity field.  This practice will allow you to remain up-to-date on the newest developments, weaknesses, groundbreaking progress, hacking incidents,...
GhostRace Attack: Major CPU and Software Giants Flaw Let Attackers Steal Passwords

GhostRace Attack: Major CPU and Software Giants Flaw Let Attackers Steal Passwords

Race conditions arise when there is no insufficient synchronization with a shared resource allowing multiple threads to access it simultaneously. The use of synchronization primitives such as mutexes, spinlock, etc. prevents these race conditions,   However,...
Researchers Uncover SnakeKeylogger Attacks, Techniques & Tactics

Researchers Uncover SnakeKeylogger Attacks, Techniques & Tactics

Threat actors use keyloggers to capture sensitive information by recording keystrokes on infected devices, as covert techniques and tactics allow them to steal valuable information without the victim's knowledge. Governments or threat actors can deploy...
Hackers Use TMChecker Remote Access Tool to Attack Popular VPN & Mail Servers

Hackers Use TMChecker Remote Access Tool to Attack Popular VPN & Mail Servers

A new tool has surfaced on the Dark Web, signaling a shift in cybercriminals' methods for gaining unauthorized remote access to corporate networks. TMChecker, a tool recently identified by ReSecurity, is designed to attack remote-access...
Google’s Gemini AI Vulnerability let Hackers Gain Control Over Users’ Queries

Google’s Gemini AI Vulnerability let Hackers Gain Control Over Users’ Queries

Researchers discovered multiple vulnerabilities in Google's Gemini Large Language Model (LLM) family, including Gemini Pro and Ultra, that allow attackers to manipulate the model's response through prompt injection. This could potentially lead to the...
Stanford University Hacked

Stanford University Hacked – Attackers Breached The Internal Network

Stanford, CA – Stanford University is reaching out to individuals potentially impacted by a recent data security breach within its Department of Public Safety. The breach, identified as a ransomware attack on September 27,...

Managed WAF

Website

Latest News