EHA
OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

OpenSSL Fixed Two High Severity Vulnerabilities That Can be Exploited Remotely

There have been two high-severity security vulnerabilities recently discovered and patched by the OpenSSL Project in its open-source cryptographic library.  Encryption of communication channels and HTTPS connections is achieved through the use of this cryptographic...
Ukraine Conduct Cyberattacks

Ukraine Recruits “IT Army” to Conduct Cyberattacks on 31 Russian Entities

Ever Since the attack of Russia, Ukraine has been taking several measures to fight the war. In one of the attack measures, Ukraine started recruiting an army of Information Technology experts to conduct several...
Hacking Tools Organizations

Hackers Use New Set of Hacking Tools to Attack Organizations in U.S

Hackers often target US organizations due to the country's economic and technological dominance, seeking valuable data for the following purposes:- Financial gain Cyber espionage Geopolitical motivations,  Desire to exploit technological vulnerabilities The cybersecurity researchers at Unit 42 recently noted...

More Than 12,000 Windows Users Attacked by Government-backed Hackers – Google’s Threat Analysis Group...

Google's Threat Analysis Group(TAG) has sent more than 12,000 warnings to users in 149 countries targeted by government-backed attackers. The warnings found to be sent between Jul-Sep 2019. TAG has analyzed more than 270 targeted...
A New Espionage Hacking Campaign Targeting Telecoms & IT Services Organizations

A New Espionage Hacking Campaign Targeting Telecoms & IT Services Organizations

A new espionage hacking campaign has been detected by the cybersecurity experts that are continuously targeting all the telecommunication and IT service providers especially in the Middle East and Asia. After investigating the attack, the...
Five Families – Hackers Collaborate to Launch Notorious Cyber Attack

Five Families – Hackers Collaborate to Launch Notorious Cyber Attack

The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia's Italian-American clans. This new group of "Five Families" involves five other groups, and here below, we have mentioned...
Rank Math SEO Plugin Flaw Exposes 2M+ Websites to Cyber Attack

Rank Math SEO Plugin Flaw Exposes 2M+ Websites to Cyber Attack

A significant vulnerability has been identified in the Rank Math SEO plugin for WordPress. This flaw, cataloged under CVE-2023-32600, exposes over two million websites to potential cyber-attacks, posing a severe security risk to online...
Hackers Launch Business Email Compromise attacks on The Automotive Industry

Hackers Launch Business Email Compromise attacks on The Automotive Industry

The automotive industry is experiencing a surge in BEC and VEC attacks, a type of email scam designed to trick employees into transferring money or revealing sensitive information.  A recent incident where a fraudster stole...
Hackers Use Google AMP Pages to Bypass Enterprise Email Security Measures

Hackers Use Google AMP Pages to Bypass Enterprise Email Security Measures

A new phishing tactic was discovered that takes advantage of Google Accelerated Mobile Pages (AMP), which is known to be successful in bypassing email security infrastructure. An open-source HTML framework called Google AMP is used...
Most common Active Directory misconfigurations that lead to cyber attacks

Most Common AD Misconfigurations Leading to Cyberattacks

Active Directory (AD) is one of the most widely used services that allow organizations to manage users, computers, and other resources inside their internal network as it offers centralized authentication and authorization mechanisms for...

Managed WAF

Website

Latest News