EHA
How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

How To Detect A Keylogger On Your Computer? Find & Remove Keylogger From PC

People who use a PC always fear that someone might be looking at all their activities for stealing thier password, reading their messages and more. But these are not just false fears it is...
Malicious Android Apps

Android Apps With Millions of Installation Redirect Users to Weaponized Websites

It seems that the Google app store has still not been able to catch malicious applications, as they are still being listed there. In the Google Play store, there are currently four malicious apps...
OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

There have been two high-severity security vulnerabilities recently discovered and patched by the OpenSSL Project in its open-source cryptographic library.  Encryption of communication channels and HTTPS connections is achieved through the use of this cryptographic...
Follina Exploit Let Hackers Compromise the Domain Controller Via RDP Session

Follina Exploit Let Hackers Compromise the Domain Controller Via RDP Session

An intrusion was detected by The DFir Report in early June 2022 that leveraged the Follina vulnerability, CVE-2022-30190 to gain initial access. Apart from getting initial access it also initiated the infection chain of...
Fodcha DDoS Botnet Now Capable of 1Tbps Power & Attack 100+ Targets Daily

Fodcha DDoS Botnet Now Capable of 1Tbps Power & Attack 100+ Targets Daily

Fodcha DDoS botnet has made a significant return with a brand new version. This updated version of the Fodcha botnet was revealed to the community for the first time by 360Netlab on April 13,...
Windows Event Log Bugs let Hackers Perform DOS & Remotely Crash Event Log Apps

Windows Event Log Bugs let Hackers Perform DOS & Remotely Crash Event Log Apps

It was revealed recently by security researchers at Varonis Threat Labs, that Microsoft Windows contains two vulnerabilities in Event logs, one of which can be exploited in order to cause a Denial of Service...
Chrome Extension With 1 Million Installation Stealing Data From Browser

Chrome Extension With 1 Million Installation Stealing Data From Browser

It has recently been discovered by the security researchers at Guardio Labs that a new malvertising campaign is on the loose. This malicious campaign is intended to achieve the following objectives: Push search hacking Chrome...
New Chinese APT Hacker Attack IT & Telecom Sectors with Signed Malware

New Chinese APT Hacker Attack IT & Telecom Sectors with Signed Malware

There has been an emerging APT group detected by security researchers at SentinelOne, code-named WIP19. This APT group's attacks in the Middle East and Asia where attackers are targeting telecommunications companies and IT companies. Researchers...
New PHP Infostealer Malware Hijacking Facebook Business Accounts

New PHP Infostealer Malware Hijacking Facebook Business Accounts

The security experts at Zscaler have reported recently that they have discovered an information-stealing malware in the wild that is dubbed Ducktail, and this is malware is based on PHP.  While for the distribution channel...
The ´┐╝Best Programming Languages for Cyber security

The Best Programming Languages for Cyber security

Introduction In our modern world, we rely on computers to do many things, from communicating with friends and family to managing our finances. Cyber security has become one of the most important aspects of our...