EHA
How to Effectively Handle Data Security During Pentest?

How to Effectively Handle Data Security During Pentest?

A lot of data is generated during pentest engagements: vulnerabilities, open ports, vulnerable IPs… Soon enough, it gets tough to keep everything tracked.  What kind of data is this? Let’s take a look at the...
Reasons to Choose CompTIA A+ Certification

Reasons to Choose CompTIA A+ Certification

Everything should be updated and matched as per the changing trends and technology. The same applies to skills. Technology is changing faster than fashion. Our operating systems and software applications are constantly updated. New...
Sophisticated Dolphin Malware

Highly Sophisticated Dolphin Malware Steals Sensitive Files and Store Them on Google Drive

Recently, cybersecurity experts at ESET identified that North Korean hackers had been actively using a previously unknown backdoor called Dolphin. This backdoor has been used for more than a year to carry out highly...
Vendor SOC 1, 2 or 3 – Understanding the Differences

Vendor SOC 1, 2 or 3 – Understanding the Differences

Your vendors pose different types of risks to your business and organization. Make sure they comply with industry standards. Deal with a SOC-compliant vendor if you use its services for critical projects. The three...
King Of Malware “Emotet” Launching Aggressive Attack Via XLS Doc & New Payloads

King Of Malware “Emotet” Launching Aggressive Attack Via XLS Doc & New Payloads

Emotet, An infamous banking trojan-based malware family with a sophisticated attack background, returns with a new attack strain via XLS documents using targeted phishing emails and delivers the new IcedID and Bumblebee payloads. Emotet built...
Why Website Captchas are Vulnerable to Cyber-Attacks?

Why Website Captchas are Vulnerable to Cyber-Attacks?

CAPTCHA and reCAPTCHA are common on all websites that require user interaction and completion of online forms. Although they were a bit annoying in the beginning, as the technology driving CAPTCHAs evolved to the...
AirAsia Hacked – 5 Million Passengers’ and Employees’ Data Stolen

AirAsia Hacked – 5 Million Passengers’ and Employees’ Data Stolen

Daixin Team launched a ransomware attack against AirAsia Group. The incident happened earlier this month over the course of two days, resulting in the leak of personal information pertaining to 5 million unique passengers...
U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Cyber security infrastructure and security Agency uncovered a potential cyber attack on the U.S Federal network where attackers compromised the organization’s DC and possibly deployed crypto Miner, credential Harvester. Iranian APT hackers launched an...
Billbug

Billbug – APT Hackers Group Attack Digital Cert Authority to Intercept The HTTPS...

Researchers uncovered that State-Sponsors APT hackers called "Billbug" attacked and compromise the digital certificate authority in multiple Asian countries along with other government and defense agencies. An ongoing campaign attributed to the infamous APT group...
Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Beware!! King of Malware Emotet Attack Windows User Via Weaponized Excel Files

Researchers uncovered an infamous and widely distributed malware Emotet, now targeting Windows users by employing a malicious Excel File after six months after its last activity. Emotet is considered a kind of malware family among the...