EHA
Critical PuTTY Client Vulnerability

Critical PuTTY Client Vulnerability Lets Attackers Recover Private Keys

A severe vulnerability has been discovered in the PuTTY client and related components, allowing attackers to fully recover NIST P-521 private keys. The PuTTY client generates heavily biased ECDSA nonces when using the NIST...
Developer Of Hive RAT Arrested By Authorities

Developer Of Hive RAT Arrested By Authorities for Stealing Login Credentials

A San Fernando Valley man has been taken into custody by federal authorities on criminal charges related to a purported scheme to sell and distribute Hive remote access trojan (RAT).   This gave buyers control over the...
StrelaStealer’s Malware Resurgence: What Security Leaders Need to Know in 2024

StrelaStealer’s Malware Resurgence: What Security Leaders Need to Know in 2024

Stolen credentials are the most common way for hackers to access an organization, according to the 2023 DBIR report. As an analyst for CyOps, Cynet’s team of experts to monitor threat actor activities and...
Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Nexperia, a Chinese chipmaker, has recently been the victim of a massive data breach where gigabytes of sensitive information have been stolen. The incident occurred when the company's internal security team discovered unauthorized server...
Hackers Launch Business Email Compromise attacks on The Automotive Industry

Hackers Launch Business Email Compromise attacks on The Automotive Industry

The automotive industry is experiencing a surge in BEC and VEC attacks, a type of email scam designed to trick employees into transferring money or revealing sensitive information.  A recent incident where a fraudster stole...
Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Recent Asian campaigns have seen an uptick in attacks targeting Linux systems, leveraging the notorious Pupy Remote Access Trojan (RAT). This malware, known for its versatility and stealth, has been employed by various threat actors...
Earth Hundun’s Hackers Employ Waterbear And Deuterbear Tools For Advanced Cyber Attacks

Earth Hundun’s Hackers Employ Waterbear And Deuterbear Tools For Advanced Cyber Attacks

Hackers always keep evolving their tools to stay ahead of defense systems and exploit new vulnerabilities. Cybersecurity researchers at Trend Micro reported that the Earth Hundun (BlackTech) cyberespionage group has seen a rise in cyberattacks.  These...
Apache Kafka Flaw Let Attackers Gain Access To Sensitive Data

Apache Kafka Flaw Let Attackers Gain Access To Sensitive Data

A new incorrect access control vulnerability has been discovered in Apache Kafka that could allow threat actors to compromise the CIA (Confidentiality, Integrity, and Availability) on the affected resource.  This vulnerability has been assigned to...
Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories)

The weekly cybersecurity news wrap-up provides readers with the latest information on emerging risks, vulnerabilities, ways to reduce them, and harmful schemes to help make defensive measures proactive. A well-developed knowledge base is necessary for...
PAN-OS Zero-day Under Active Attack

Palo Alto Networks PAN-OS Zero-day Under Active Attack

In a recent security alert, Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified as CVE-2024-3400. This zero-day flaw, found in the GlobalProtect Gateway, is currently under active exploitation...

Managed WAF

Website

Latest News