EHA
Hackers Can Abuse Windows Container Isolation Framework to Bypass Organization Security Defences

Hackers Abuse Windows Container Isolation Framework to Bypass Security Defences

Recently, cybersecurity researchers at Deep Instinct have asserted that hackers can exploit the Windows container isolation framework to bypass the security defenses and mechanisms of organizations. Containers revolutionize the way applications are packaged and isolated,...
Five Families – Hackers Collaborate to Launch Notorious Cyber Attack

Five Families – Hackers Collaborate to Launch Notorious Cyber Attack

The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia's Italian-American clans. This new group of "Five Families" involves five other groups, and here below, we have mentioned...
Top 3 Malware Loaders of 2023 that Fueling 80% of Cyber Attacks

Top 3 Malware Loaders of 2023 that Fueling 80% of Cyber Attacks

SOC teams find malware loaders challenging, as the different loaders, even for the same malware, need distinct mitigation.  Besides this, they are the key and most important elements for initial network access and payload delivery,...
How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship

How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship

Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.  But, besides its innovative part, cybercriminals have also actively exploited these generative AI models for several illicit purposes,...
4 Cyber Attacks that Frequently Evade Detection and How to Address Them

4 Cyber Threats that Frequently Evade Detection and How to Address Them

Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily breeze through at least the initial...
Researchers Uncover New technique to Detect Malicious Websites

Researchers Uncover New technique to Detect Malicious Websites

The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains as a launchpad platform, threat actors can perform the following activities on Malicious Websites:- Distribute...
Kroll Experiences Data Breach After Employee Is Hacked Via SIM-Swap Attack

Kroll Suffers Data Breach as Employee Falls Victim to SIM Swap Hack

A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as "SIM swapping," which allowed the threat actor to gain unauthorized access to sensitive personal information. On Saturday, August 19,...
Threat and Vulnerability Roundup for the week of August 20th to 26th

Threat and Vulnerability Roundup for the week of August 20th to 26th

Welcome to the Threat and Vulnerability Roundup, a weekly publication from Cyber Writes that provides the most recent news on cybersecurity. Use our wide coverage to stay up to date. Critical flaws, exploits, and recent...
Smart Bulbs Hacked

Smart Bulbs can be Hacked to Steal Wi-Fi Passwords

The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming basic items into controllable smart devices via smartphones, including light bulbs and plugs. In 2021,...
Cyber Criminals Turned Mac Systems into Proxy Exit Nodes

Cyber Criminals Turned Mac Systems into Proxy Exit Nodes

Besides Windows OS, now threat actors are also actively targeting Mac systems to accomplish their illicit goals. Cybersecurity analysts at AT&T Alien Labs recently observed that threat actors are actively turning Mac systems into...

Managed WAF

Website

Latest News