EHA
Home Cyber Security News

Cyber Security News

Bondnet Using High-Performance Bots For C2 Server

Bondnet Using High-Performance Bots For C2 Server

Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently. These bots can work quickly, flood systems, steal information, and conduct and orchestrate sophisticated cyber operations largely autonomously. Cybersecurity researchers at ASEC recently discovered...
Discord-Based Malware Attacking Orgs Linux Systems In India

Discord-Based Malware Attacking Orgs Linux Systems In India

Linux systems are deployed mostly in servers, in the cloud, and in environments that are considered vital; consequently, they are often compromised by attacks from threat actors. This wide use and deployment of Linux makes...
New Moonstone Sleet North Korean Actor Deploying Malicious Open Source Packages

New Moonstone Sleet North Korean Actor Deploying Malicious Open Source Packages

In December 2023, we reported on how North Korean threat actors, particularly Jade Sleet, have been compromising supply chains through the open-source ecosystem. One of their key tactics is the exploitation of the public...
Life360 Breach: Hackers Accessed the Tile Customer Support Platform

Life360 Breach: Hackers Accessed the Tile Customer Support Platform

Life360, a company known for its family safety services, recently fell victim to a criminal extortion attempt. The company received emails from an unknown actor claiming to possess Tile customer information. Upon receiving these...
Windows AI Recall Delayed

Microsoft Delays Release of Controversial Windows AI Recall Tool Amid Privacy Concerns

Microsoft has announced that it will delay the broad release of its AI-powered Recall feature for Windows Copilot+ PCs, following heavy criticism from users and privacy advocates. The feature, which was originally slated for wide...
SmokeLoader – A Modular Malware With Range Of Capabilities

SmokeLoader – A Modular Malware With Range Of Capabilities

Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides this malware is also helpful in conducting cyber warfare or receptive intelligence by the nation-state...
Hackers Abuse Windows Search Functionality To Deploy Malware

Hackers Abuse Windows Search Functionality To Deploy Malware

Hackers use Windows Search's vulnerability to penetrate different layers and rooms in the client's systems and execute unauthorized code by using bugs in the search functionality itself.  This enables them to increase their privileges, disseminate...
Github Paid $4,000,000 In Rewards For Bug Bounty Program

GitHub Paid $4,000,000 In Rewards For Bug Bounty Program

GitHub, the world’s leading software development platform, is celebrating a milestone: the 10th anniversary of its Security Bug Bounty program. Over the past decade, the program has not only enhanced the security of GitHub’s...
Kulicke & Soffa Data Breach – 12 Million Files Leaked

Kulicke & Soffa Data Breach – 12 Million Files Leaked

Kulicke and Soffa Industries, Inc. (K&S), a leading semiconductor packaging and electronic assembly solutions provider, has disclosed a data breach that has compromised approximately 12 million files. Initially detected on May 12, 2024, the...
Threat Actor Claiming of Israel’s Government API Database

Threat Actor Claiming of Israel’s Government API Database

A threat actor has claimed responsibility for breaching Israel's government API database. The announcement was made via a post on social media X by the darkwebinformer. https://twitter.com/darkwebinformer/status/1800975641904398385?s=46 The post, which has since garnered significant attention, alleges...

Managed WAF

Website

Latest News