EHA
New WogRAT Malware Exploits Notepad Service To Exploit Windows And Linux Systems

WogRAT Malware Exploits Notepad Service To Attack Windows & Linux Systems

Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used application on most operating systems. Through malware, it is possible to use this tool to...
Facebook & Instagram is Down, Massive Disruption in Meta History

Facebook & Instagram is Down, Massive Disruption in Meta History

In a rare and disruptive event, Facebook, Instagram, and Google experienced a widespread outage that prevented users worldwide from accessing their accounts. The outage, which affected social media platforms and the tech giant's services,...
CISA & FBI Releases TTPs & IOCs Used by Phobos Ransomware Group

CISA & FBI Releases TTPs & IOCs Used by Phobos Ransomware Group

The FBI, CISA, and MS-ISAC are urging critical infrastructure organizations to be vigilant against Phobos ransomware.  This advisory is part of the #StopRansomware initiative, providing defenders with details on Phobos ransomware, including its tactics, indicators...
Vulnerability Management Tools

12 Best Vulnerability Management Tools 2024

Vulnerability Management Tools play a significant role in detecting, analyzing, and patching vulnerabilities in web and network-based applications. Vulnerability, risk, and threat are the most common words used when it comes to security. Risk...
U.S. Asks NSO Group to disclose Code Related to Pegasus spyware

U.S. Asks NSO Group to Disclose Code Related to Pegasus Spyware

A U.S. district court has mandated that the Israeli firm NSO Group, known for its Pegasus spyware, must provide WhatsApp with documents and code linked to the spyware. This ruling is part of a...
AWS Network Access Security

Best AWS Network Access Security Solutions – 2024

AWS (Amazon Web Services) network access refers to the methods and services that allow users and applications to connect to AWS resources, services, and the internet. AWS offers a comprehensive set of networking services...
TLS-based SparkCockpit & SparkTar Malware Ivanti’s Pulse Secure VPN

TLS-based SparkCockpit & SparkTar Malware Ivanti’s Pulse Secure VPN

A recent investigation has uncovered a flaw in internet-connected doorbell cameras, specifically affecting Ivanti's Pulse Secure appliances. The NVISO Incident Response team discovered the discovery, which identified two covert TLS-based backdoors, SparkCockpit and SparkTar,...
CWE Version 4.14 Released

CWE Version 4.14 Released : What’s New!

The Common Weakness Enumeration (CWE) project, a community-developed list of common software and hardware weakness types, has announced the release of version 4.14. This latest version introduces significant updates and improvements, including new entries and...
Hackers Using Weaponized ZIP File To Steal NTLM Hashes

Hackers Using Weaponized ZIP File To Steal NTLM Hashes

Threat actors use ZIP files to weaponize them since they can easily convey malicious payloads within compressed archives, making it difficult for security systems to detect and study the file’s contents.  These files can be...
Kali Linux 2024.1 Released with New Hacking Tools – What’s New!

Kali Linux 2024.1 Released with New Hacking Tools – What’s New!

Kali Linux 2024.1 was released, marking the year's first release with new hacking tools, visual elements, and updates. Kali Linux, a Debian-derived OS by Offensive Security, is dedicated to ethical hacking and penetration testing....

Managed WAF

Website

Latest News