EHA
Home Cyber Security Research

Cyber Security Research

Smoke Loader Attacking Financial Institutions Running Microsoft Windows

Smoke Loader Attacking Financial Institutions Running Microsoft Windows

The reason hackers go after financial institutions is because these places have valuable things like money, intellectual property, and sensitive customer information.  Hacked financial systems can result in monetary gain by means of theft, blackmail...
PyRIT : Automated AI Toolkit For Security Professionals

PyRIT : Automated AI Toolkit For Security Professionals

A new Python automation framework has been released for risk identification in generative AI. This new framework has been named "PyRIT," and it can help security professionals and machine learning engineers find risks in...
CISA And FBI Warns That Hackers Use SQL Injection Vulnerabilities To Hack Servers

CISA & FBI : Hackers Exploiting SQL Injection Flaws To Hack Servers

CISA and the FBI released the Secure by Design Alert to address SQL injection vulnerabilities in software that affect thousands of organizations. A persistent class of defects in commercial software solutions is SQL injection, or...
Users Monitoring Best Practices

Top 10 Privileged Users Monitoring Best Practices – 2023

Privileged users typically hold crucial positions within organizations. They usually have elevated access, authority, and permission levels in the organization's IT systems, networks, applications, and critical data. That’s why they may pose risks to...
PrintListener Attack

Hackers Use Fingertip Friction Sound To Steal Fingerprints

Researchers have unveiled a new cybersecurity threat that could compromise the integrity of fingerprint authentication systems worldwide. The method, dubbed "PrintListener," exploits the sound of fingertip friction on smartphone screens to infer and reconstruct...
Simplify Your Malware Sandboxes Configuration – Practical Guide

Practical Guide to Simplify Your Malware Sandboxes Configuration

Malware sandboxes are integral to security applications like intrusion detection, forensics, and threat intelligence, but using them correctly is challenging due to choices in implementations, monitoring techniques, and configurations.  Improper use can negatively impact applications...
Researched Exploit DHCP To Escalate Privileges In Windows Domains

Hackers Exploit DHCP To Escalate Privileges In Windows Domains

Researchers at Akamai have unveiled a new technique that could potentially put millions of Windows domains at risk. This technique exploits the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges within Active...
GTPDOOR Linux Malware Exploiting GPRS Protocol For Stealthy C2 Communication

GTPDOOR Linux Malware Exploiting GPRS Protocol For Stealthy C2 Communication

Threat actors exploit Linux malware due to the widespread use of Linux servers in critical infrastructure and web hosting.  Linux's prevalence makes it an attractive target for cybercriminals seeking to compromise systems, steal data, or...
Malware Families Adapting To COM Hijacking Technique To Achieve Persistence

Malware Families Adapting To COM Hijacking Technique For Persistence

COM (Component Object Model) hijacking is a technique in which threat actors exploit the core architecture of Windows by adding a new value on a specific registry key related to the COM object. This...
Xeno RAT Abuses Windows DLL Search To Avoid Detection

Xeno RAT Abuses Windows DLL Search To Avoid Detection

A new sophisticated malware, which is written in C# and has sophisticated functionalities, has been discovered. This new malware has been named  Xeno RAT and is capable of evading detection, payload generation and to...

Managed WAF

Website

Latest News