EHA
Stargazers Ghost

Stargazers Ghost: Network of GitHub Accounts Used to Deliver Malware

Cybersecurity researchers at Check Point have uncovered a sophisticated network of GitHub accounts, dubbed the Stargazers Ghost Network, that has been distributing malware and phishing links since at least June 2023. This network, operated by...
LiteSpeed Cache Plugin Flaw Let Attackers Inject Malicious Code, 5M+ Sites Impacted

LiteSpeed Cache Plugin Flaw Let Attackers Inject Malicious Code, 5M+ Sites Impacted

The popular LiteSpeed Cache plugin for WordPress has been found vulnerable to a Cross-Site Request Forgery (CSRF) attack, which could potentially impact over 5 million websites. The flaw, identified as CVE-2024-3246, was publicly disclosed on...
KnowBe4 Hired Fake North Korean IT Worker, Catches While Installing Malware

KnowBe4 Hired Fake North Korean IT Worker, Catches While Installing Malware

Security awareness and training provider KnowBe4 recently disclosed that it inadvertently hired a fake North Korean IT worker who attempted to install malware on a company-issued computer. The incident highlights the growing sophistication of...
Pentagon IT Service Provider Hacked: U.S. Government Secrets Exposed

Pentagon IT Service Provider Hacked: U.S. Government Secrets Exposed

Leidos Holdings Inc., one of the largest IT services providers to the U.S. government, experienced a significant cybersecurity breach. Hackers leaked internal documents, raising concerns about the security of sensitive government data managed by...
Wiz Rejects Google’s $23 Billion Deal

Wiz Rejects Google’s $23 Billion Deal

Wiz, the $12 billion cloud security startup, has rejected a $23 billion acquisition offer from Google parent Alphabet. Fortune viewed an internal note that communicated the decision to the company's 1,200 employees. "While we are...
Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin is available on multiple browsers like Edge, Chrome, Safari, and Firefox. Combining all these browsers, the plugin has over 5 million users. However, this plugin was discovered to have a Cross-site Scripting...
CrowdStrike filed a FORM 8-K to Clarify the Friday’s Update Event

CrowdStrike filed a FORM 8-K to Clarify the Friday’s Update Event

CrowdStrike Holdings, Inc. faced an unexpected challenge when a sensor configuration update for their Falcon sensor software resulted in outages for numerous customers utilizing specific Windows systems. The company promptly addressed the issue, emphasizing...
Beware Of Braodo Stealer That Steals Users’ Login Credentials

Beware Of Braodo Stealer That Steals Users’ Login Credentials

Stealers are one of the most used malicious tools that is used by threat actors. As such tools enable hackers to obtain sensitive information such as passwords, credit card details, and personal data from...
Telegram Zero-Day Vulnerability Exploited Using Malicious Video Files

Telegram Zero-Day Vulnerability Exploited Using Malicious Video Files

ESET researchers recently discovered a critical zero-day vulnerability in the Telegram messaging app for Android, potentially exposing millions of users to malicious attacks. The exploit, dubbed "EvilVideo," allowed attackers to disguise harmful Android payloads as...
All-in-One Cybersecurity Platform

Why All-in-One Platforms Are the Future of Cybersecurity

Once upon a time, I.T. security teams depended on hodgepodges of different cybersecurity solutions from various vendors. However, these multivendor tech stacks became prohibitively costly and complex to integrate and manage, creating gaps for...

Managed WAF

Website

Latest News