EHA
New Hacker Group Uses SQL Injection to Hack Companies in APAC Region

New Hacker Group Uses SQL Injection to Hack Companies in APAC Region

A new threat actor has been discovered to be using SQL injection attacks to gain unauthorized access to organizations in the APAC region. This threat actor has been named "GambleForce" and is using publicly...
New iPhone Hack Lockdown Mode

New iPhone Hack Convinces Users With Fake Lockdown Mode

A post-exploitation tampering technique has been discovered that allows the malware to visually trick the user into thinking their iPhone is in Lockdown Mode. While iOS devices with Lockdown Mode have a smaller attack surface,...
Lazarus Group Attacking Crypto

Lazarus Group Attacking Crypto Users Via Telegram to Deploy Malware

In a calculated escalation of cyber warfare, the Lazarus Group, a notorious North Korea hacking unit, has pivoted its focus to cryptocurrency projects, employing intricate phishing scams on the widely-used platform Telegram.  SlowMist, a cybersecurity...
Cyber Attack Maps

Top 10 Cyber Attack Maps to See Digital Threats In 2024

Cyber attack maps are visual representations or interactive tools that provide real-time or historical information about cyber attacks and their global distribution. These maps aim to give users a visual understanding of the scale...
Hackers Crypto Liquidity Pools

Hackers Exploiting Crypto Liquidity Pools to Execute Profitable Trades

Crypto pool liquidity is the total assets locked in a decentralized finance (DeFi) liquidity pool. Hackers manipulate the pool liquidity to create artificial imbalances that allow them to control prices and execute profitable trades.  Not only...
LogoFAIL – Critical UEFI Vulnerabilities Exposes Devices to Stealthy Malware Attack

LogoFAIL – Critical UEFI Vulnerabilities Exposes Devices to Stealthy Malware Attack

UEFI vulnerabilities pose significant threats, enabling hackers to execute malicious code during system boot, bypass security measures, and establish persistent control.  Exploiting these flaws allows attackers to compromise the entire system, leading to: Unauthorized access Data theft The...
Hacking Tools Organizations

Hackers Use New Set of Hacking Tools to Attack Organizations in U.S

Hackers often target US organizations due to the country's economic and technological dominance, seeking valuable data for the following purposes:- Financial gain Cyber espionage Geopolitical motivations,  Desire to exploit technological vulnerabilities The cybersecurity researchers at Unit 42 recently noted...
Cybercriminals are Showing Hesitation to Utilize AI When Executing Cyber Attacks

Cybercriminals are Showing Hesitation to Utilize AI When Executing Cyber Attacks

Media reports highlight the sale of LLMs like WormGPT and FraudGPT on underground forums. Fears mount over their potential for creating mutating malware, fueling a craze in the cybercriminal underground. Concerns arise over the dual-use...
Slovenia’s biggest power provider has suffered a cyberattack

Slovenia’s Biggest Power Provider has Suffered a Cyberattack

One of Slovenia's major power providers, HSE, has recently fallen victim to a significant cyberattack. The security and control system, along with the fire alarms, were breached by the criminal who caused significant damage. It has...
Kansas Court Hack: Attackers Stole Sensitive Data From Systems

Kansas Court Hack: Attackers Stole Sensitive Data From Systems

Kanas Supreme Court released the statement for the cyber incident that stole sensitive data from systems. The Kansas Supreme Court released the Statement (Chief Justice Marla Luckert and Justices Eric Rosen, Dan Biles, Caleb Stegall,...

Managed WAF

Website

Latest News