EHA
Out Hack A Hacker? Knowing How They Think And How To Protect Yourself

Out Hack A Hacker? Knowing How They Think And How To Protect Yourself

 8 Things You Can Do To Stop Hackers Dead In Their Tracks Cybercrime is on the up and up. Technological advancements have facilitated inventive ways for cybercriminals to hack into our PC, Mac, and smartphone...
Transparent Tribe Hackers Attack Indian Officials With New Hacking Campaigns

Transparent Tribe Hackers Attack Indian Officials With New Hacking Campaigns

Another campaign targeting Windows-based remote access trojan named CrimsonRAT has been associated with the Transparent Tribe hacking group, a threat actor of Pakistani origin, since as far back as June 2021. CapraRAT, a backdoor that...
Microsoft Blocks the POLONIUM Hackers From Abusing OneDrive To Exfiltrate the Data 

Microsoft Blocks the POLONIUM Hackers From Abusing OneDrive To Exfiltrate the Data 

Recently Microsoft has detected and blocked attacks on OneDrive from a group of hackers called POLONIUM who are operating from Lebanon.  While attacking and compromising Israelian organizations, they sought to exfiltrate data from the OneDrive...
iCloud Hacker Pleaded Guilty – Sentenced To 9 Years in Prison For Breaching iCloud Accounts

iCloud Hacker Pleaded Guilty – Sentenced To 9 Years in Prison For Breaching iCloud...

The hacking of thousands of Apple iCloud accounts by an individual from California in October 2021 resulted in the plea of guilty to conspiracy and computer fraud. Consequently, the man was sentenced to 9...
How to keep your cell phone safe from hackers and scammers

How to keep your cell phone safe from hackers and scammers

If you're like most, your cell phone is one of your most important possessions. It's your lifeline to the outside world, and it contains a wealth of personal information. So it's no wonder that...
Former Owner of T-Mobile Retail Store Accessed

Former Owner of T-Mobile Retail Store Accessed Internal Systems to Unlock and Unblock Cell...

There has been an enormous breach within the internal system of T-Mobile that has caused a lot of damage to the company. T-Mobile's internal systems were illegally accessed by a former owner of a...
hackers hijack satellite

Hackers Gained Control of a Decommissioned Satellite to Broadcast Movies

A decommissioned Canadian satellite was hacked and used to broadcast films. At the DEF CON hacking conference in Las Vegas, Karl Koscher, one of the members of a hacking enthusiasts group called Shadytel, give...
Uber Hacked – Attackers Gained Full Access to Company’s Critical IT Systems

Uber Hacked – Attackers Gained Full Access to Company’s Critical IT Systems

A breach in Uber's computer network was discovered that caused several internal communication systems and engineering systems were taken offline by the company. It appears that there have been many internal systems at Uber that...
Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Wintermute, a crypto trading firm, has been targeted in the latest crypto heist to steal more than $160 million in digital assets. Only DeFi operations were affected by this hack, while lending and over-the-counter (OTC)...
CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

The CISA has recently published a joint CSA with the NSA and the FBI about the top CVEs that are exploited by the threat actors since 2020 and the threat actors are Chinese state-sponsored. Chinese...