EHA
SAPwned Widespread Supply-Chain Attacks Let Attackers Access Cloud Environments

SAPwned Vulnerability Attack Let Hackers Gain Control to Users Cloud Environments

Multiple vulnerabilities in SAP AI Core had been identified, giving malicious actors access to customer data and the ability to take control of the service. With SAP AI Core, users may leverage the company's extensive...
Tools Used By NullBulge Actor, Who Released Disney’s Internal Slack Communications

Tools Used By NullBulge Actor, Who Released Disney’s Internal Slack Communications

Hackers often target internal communications tools to obtain confidential information like employee records, business plans, and proprietary technologies. With these characteristics of trust and openness, internal communications provide valuable but less secure means for cyber-attacks...
Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers Attacking Windows Users With Internet Explorer Zero-Day Vulnerability

Hackers target legitimate Remote Monitoring and Management (RMM) tools as they provide powerful, trusted access to systems and networks. This can facilitate the widespread and efficient deployment of malware across an organization's infrastructure. Cybersecurity researchers at...
CRYSTALRAY Hackers Exploiting Popular pentesting Tools To Evade Detections

CRYSTALRAY Hackers Exploiting Popular pentesting Tools To Evade Detections

The threat actor Crystalray, previously observed using SSH-Snake, has significantly expanded operations, targeting over 1,500 victims.  Employing mass scanning, exploiting multiple vulnerabilities, and utilizing tools like zmap, asn, httpx, nuclei, platypus, and SSH-Snake, CRYSTALRAY aims...
OilAlpha Hacker Group Attacking humanitarian And Human Rights Organizations

OilAlpha Hacker Group Attacking Humanitarian & Human Rights Organizations

A pro-Houthi group, OilAlpha, is targeting humanitarian organizations in Yemen with malicious Android applications by stealing credentials and gathering intelligence, potentially disrupting aid distribution.  The applications target sensitive data and require invasive permissions, such as...
Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system.  These files can be disguised as harmless icons but actually contain commands that, when clicked, launch harmful...
Fujitsu Cyber Attack: Customers’ Personal Information Exposed

Fujitsu Cyber Attack: Customers’ Personal Information Exposed

Fujitsu Limited has disclosed the results of an investigation into a cyberattack that potentially exposed customers' personal information. The breach, first announced on March 15, 2024, was caused by sophisticated malware that infiltrated the company's...
Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files

Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files

Hackers often use EXE and DOCX file formats is due to they are among the most commonly used types of files that can be easily disguised as legitimate. EXE files can be used to deliver...
Teamviewer Discloses Investigation Update Following Cyber Attack

Teamviewer Discloses Investigation Update Following Cyber Attack

TeamViewer, the global leader in remote connectivity solutions, has provided an update on the cyber attack detected on June 26, 2024. The company has concluded the main incident response and investigation phase, confirming that...
Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Hackers frequently target schools and bank servers to obtain important personal information, including financial data, that can be used for identity theft and financial fraud. These data are also being sold on the dark...

Managed WAF

Website

Latest News