EHA
Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system.  These files can be disguised as harmless icons but actually contain commands that, when clicked, launch harmful...
Fujitsu Cyber Attack: Customers’ Personal Information Exposed

Fujitsu Cyber Attack: Customers’ Personal Information Exposed

Fujitsu Limited has disclosed the results of an investigation into a cyberattack that potentially exposed customers' personal information. The breach, first announced on March 15, 2024, was caused by sophisticated malware that infiltrated the company's...
Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files

Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files

Hackers often use EXE and DOCX file formats is due to they are among the most commonly used types of files that can be easily disguised as legitimate. EXE files can be used to deliver...
Teamviewer Discloses Investigation Update Following Cyber Attack

Teamviewer Discloses Investigation Update Following Cyber Attack

TeamViewer, the global leader in remote connectivity solutions, has provided an update on the cyber attack detected on June 26, 2024. The company has concluded the main incident response and investigation phase, confirming that...
Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Hackers frequently target schools and bank servers to obtain important personal information, including financial data, that can be used for identity theft and financial fraud. These data are also being sold on the dark...
Hackers Using ProxyLogon And ProxyShell To Attack Microsoft Exchange Servers

Hackers Using ProxyLogon & ProxyShell To Attack Microsoft Exchange Servers

Hackers attack Microsoft Exchange servers because they often contain sensitive communication data that can be exploited for several illicit purposes. Besides this, the widespread use of Microsoft Exchange in enterprises makes it an attractive and...
SnailLoad Side-Channel Attack

New SnailLoad Side-Channel Attack Let Hackers Monitor Your Web Activity

Hackers often monitor web activities to gather several types of confidential data. By tracking your online activities, hackers can tailor phishing schemes and social engineering attacks, which will increase their chances of success. The following cybersecurity...
New Volcano Demon Ransomware Group Threatening Victims Over Phone Call

New Volcano Demon Ransomware Group Threatening Victims Over Phone Call

A novel malware known as Volcano Demon has been observed targeting Windows workstations and servers, obtaining administrative credentials from the network. The threat actor doesn't have a leak site and instead uses phone calls to...
Passkeys Via AitM Phishing Attacks

Hackers Breaking Passkeys Using AitM Phishing Attacks

Hackers abuse phishing attacks as they are highly effective and low-cost methods for deceiving users into revealing sensitive information. Despite the recent surge in passkey adoption by large tech firms, Joe Stewart of Esentire discovered...
Xctdoor Malware Attacking IIS Servers To Distribute Malware

Xctdoor Malware Attacking IIS Servers To Distribute Malware

Threat actors target IIS servers, as most of the internet-based crucial applications and services are installed on these servers. Hackers find these attractive targets for penetrating different organizational systems and information databases. Besides this, the...

Managed WAF

Website

Latest News