EHA
BadPack APK Malware

BadPack APK Malware Using Wired Trick to Attack Users & Stay Undetected

Hackers often exploit the APK packers to hide malicious codes within Android applications. This will make detecting and analyzing malware more difficult for security programs. This technique increases the likelihood of a successful breach while...
INTERPOL Taken Down West African Organized Crime Groups

INTERPOL Taken Down West African Organized Crime Groups

Operation Jackal III has successfully targeted West African organized crime groups, including the notorious Black Axe syndicate. From April 10 to July 3, the operation spanned 21 countries across five continents. The coordinated effort led...
Malware Via JPEG Files

Beware Of Weaponized AWS Packages That Deliver Malware Via JPEG Files

Attackers hide malicious payloads deep within seemingly legitimate Python packages, where two such packages were found. One, img-aws-s3-object-multipart-copy, is a copy of a real library on GitHub.  They modified the code to execute a hidden...
Critical Apache HTTP Server Vulnerabilities Expose Millions of Websites to Cyber Attack

Critical Apache HTTP Server Vulnerabilities Expose Millions of Websites to Cyber Attack

The Apache Software Foundation has disclosed several critical vulnerabilities in the Apache HTTP Server, which could potentially expose millions of websites to cyber-attacks. These vulnerabilities, identified by their Common Vulnerabilities and Exposures (CVE) numbers,...
SAPwned Widespread Supply-Chain Attacks Let Attackers Access Cloud Environments

SAPwned Vulnerability Attack Let Hackers Gain Control to Users Cloud Environments

Multiple vulnerabilities in SAP AI Core had been identified, giving malicious actors access to customer data and the ability to take control of the service. With SAP AI Core, users may leverage the company's extensive...
Leaked Cellebrite Docs Reveal List of Phones That Can Be Unlocked

Leaked Cellebrite Tool Docs Reveal List of Phones That Can Be Unlocked

Confidential documents from mobile forensics company Cellebrite, recently obtained and verified by 404 Media, provide a rare glimpse into the capabilities and limitations of phone unlocking technology used by law enforcement agencies worldwide. Cellebrite DI...
Cisco Smart Software Manager Flaw Let Attackers Change Any User Passwords

Cisco Smart Software Manager Flaw Let Attackers Change Any User Passwords

Cisco has disclosed a critical vulnerability in its Smart Software Manager On-Prem (SSM On-Prem) that permits unauthenticated, remote attackers to change the passwords of any user, including administrative users. This flaw tracked as CVE-2024-20419,...
Beware of Fake Microsoft Teams That Deliver macOS Malware

Beware of Fake Microsoft Teams That Deliver macOS Malware

Hackers often mimic popular tools like Microsoft Teams to exploit people's trust and familiarity with these applications.  This strategy increases the probability of users' subsequent downloading and installation of this malicious software, consequently permitting attackers...
Resonance Security Launches Harmony to Help Businesses Combat Web2 and Web3 App Threats

Resonance Security Launches Harmony to Help Businesses Combat Web2 and Web3 App Threats

Cybersecurity firm Resonance Security has rolled out ‘Harmony’, a new asset monitoring tool to guard Web2 and Web3 apps from major threats.  The launch comes as cybersecurity threats are getting tougher and more complex. Traditional...
Ivanti Endpoint Manager SQLi Vulnerability Allows Remote Code Execution

Ivanti Endpoint Manager SQLi Vulnerability Allows Remote Code Execution

A critical security flaw, CVE-2024-37381, has been discovered in the Ivanti Endpoint Manager (EPM) 2024 flat. The vulnerability is an unspecified SQL injection flaw in the core server component of EPM, potentially allowing attackers to execute...

Managed WAF

Website

Latest News