EHA
CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

CSA Provides Common Vulnerability Exploited by China State-Sponsored Hackers – A Complete List

The CISA has recently published a joint CSA with the NSA and the FBI about the top CVEs that are exploited by the threat actors since 2020 and the threat actors are Chinese state-sponsored. Chinese...
How to keep your cell phone safe from hackers and scammers

How to keep your cell phone safe from hackers and scammers

If you're like most, your cell phone is one of your most important possessions. It's your lifeline to the outside world, and it contains a wealth of personal information. So it's no wonder that...
Bug in Honda, Nissan, Toyota Cars App Let Hackers Unlock & Start The Car Remotely

Bug in Honda, Nissan, Toyota Cars App Let Hackers Unlock & Start The Car...

A critical vulnerability uncovered in Honda, Nissan, Infiniti, and Acura vehicle apps lets hackers and law enforcement agencies unlock the car remotely and start the vehicle with a laptop from anywhere in the world. The...
Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Wintermute, a crypto trading firm, has been targeted in the latest crypto heist to steal more than $160 million in digital assets. Only DeFi operations were affected by this hack, while lending and over-the-counter (OTC)...
U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Federal Network Hacked – APT Hackers Gained Access to the Domain Controller

U.S Cyber security infrastructure and security Agency uncovered a potential cyber attack on the U.S Federal network where attackers compromised the organization’s DC and possibly deployed crypto Miner, credential Harvester. Iranian APT hackers launched an...
Transparent Tribe Hackers Attack Indian Officials With New Hacking Campaigns

Transparent Tribe Hackers Attack Indian Officials With New Hacking Campaigns

Another campaign targeting Windows-based remote access trojan named CrimsonRAT has been associated with the Transparent Tribe hacking group, a threat actor of Pakistani origin, since as far back as June 2021. CapraRAT, a backdoor that...
hackers hijack satellite

Hackers Gained Control of a Decommissioned Satellite to Broadcast Movies

A decommissioned Canadian satellite was hacked and used to broadcast films. At the DEF CON hacking conference in Las Vegas, Karl Koscher, one of the members of a hacking enthusiasts group called Shadytel, give...
Former Owner of T-Mobile Retail Store Accessed

Former Owner of T-Mobile Retail Store Accessed Internal Systems to Unlock and Unblock Cell...

There has been an enormous breach within the internal system of T-Mobile that has caused a lot of damage to the company. T-Mobile's internal systems were illegally accessed by a former owner of a...
iCloud Hacker Pleaded Guilty – Sentenced To 9 Years in Prison For Breaching iCloud Accounts

iCloud Hacker Pleaded Guilty – Sentenced To 9 Years in Prison For Breaching iCloud...

The hacking of thousands of Apple iCloud accounts by an individual from California in October 2021 resulted in the plea of guilty to conspiracy and computer fraud. Consequently, the man was sentenced to 9...
Out Hack A Hacker? Knowing How They Think And How To Protect Yourself

Out Hack A Hacker? Knowing How They Think And How To Protect Yourself

 8 Things You Can Do To Stop Hackers Dead In Their Tracks Cybercrime is on the up and up. Technological advancements have facilitated inventive ways for cybercriminals to hack into our PC, Mac, and smartphone...