EHA
How Secure Is Wi-Fi In General

How Secure Is Wi-Fi In General

Since we now live in times where virtually everything is online, the matter of our personal security becomes more important than ever. But with fast and easy access to the internet, that’s literally at...
Beware of Fake Google Chrome Update Pop-Ups that Installs Malware

Beware of Fake Google Chrome Update Pop-Ups that Installs Malware

In the ever-changing cybersecurity landscape, a persistent threat appears in the form of a fake Chrome update.  Usually, these efforts involve injecting harmful code into a website, which prompts individuals to update their web browsers...
First Ever SaaS Ransomware Attack Leveraged SharePoint Online

First Ever SaaS Ransomware Attack Leveraged SharePoint Online

The Obsidian cybersecurity firm has recently documented a successful ransomware attack targeting Sharepoint Online (Microsoft 365).  The hackers stealthily exploited a Microsoft Global SaaS admin account in a departure from the standard compromised endpoint route. The...
Tor Browser 13.0 Released: What’s New

Tor Browser 13.0 Released: What’s New

Tor Browser 13.0.14 has been released, bringing essential security updates to the popular privacy-focused web browser. This latest version includes updates to the underlying Firefox browser and several bug fixes and improvements. Critical Updates in Tor...
When Security Solutions Fail: How Can Continuous Security Validation Help Teams?

When Security Solutions Fail: How Can Continuous Security Validation Help Teams?

Companies that have financial resources to allocate toward cybersecurity are hacked every day. In January, there was a Royal Mail ransomware attack that halted international shipments for weeks. In February, Coinbase suffered a data breach following...
CWE Version 4.14 Released

CWE Version 4.14 Released : What’s New!

The Common Weakness Enumeration (CWE) project, a community-developed list of common software and hardware weakness types, has announced the release of version 4.14. This latest version introduces significant updates and improvements, including new entries and...
Weaponized Telegram App

Weaponized Telegram App Infected Over 60K Android Users

Telegram Messenger offers global, cloud-based instant messaging with several features:- Optional end-to-end-encryption Video calling VoIP File sharing Cybersecurity researchers at Securlist recently found several Telegram mods on Google Play in various languages (traditional Chinese, simplified Chinese, and Uighur), claiming...
Lambda Layers Code Execution Flaw Leads To Supply Chain On AI/ML Applications

Lambda Layers Code Execution Flaw Leads To Supply Chain On AI/ML Applications

A new supply-chain vulnerability has been identified in the Lambda Layers of third-party TensorFlow-based Keras models. This vulnerability could allow threat actors to inject arbitrary code into any AI/ML application. Any Lambda Layers that were...
Beware of New Android Trojan That Executes Malicious Commands on Your Phone

Beware of New Android Trojan That Executes Malicious Commands on Your Phone

Cybersecurity researchers at XLab have uncovered a new Android malware strain called "Wpeeper." This sophisticated backdoor Trojan has been designed to infiltrate Android systems and execute a wide range of malicious commands, posing a significant...
APT Group Attacks Indian Defense Units and Armed Forces Since 2019 Aimed to Steal Sensitive Data

APT Group Attacks Indian Defense Units and Armed Forces Since 2019 Aimed to Steal...

The intelligence and security reports have claimed that since 2019 the APT group was exploiting the Indian defense unit and Armed forces to steal sensitive information. The security firm, Seqrite has disclosed this attack,...

Managed WAF

Website

Latest News