EHA
HP Hacked by Russian ‘Cozy Bear’ hacker Group

HP Hacked by Russian ‘Cozy Bear’ Hacker Group

On December 12, 2023, Hewlett Packard Enterprise (HPE) received chilling news: the notorious nation-state actor Midnight Blizzard, also known as Cozy Bear, had breached its cloud-based email environment.  This audacious cyber espionage campaign sent shockwaves...
Iranian Mint Sandstorm Attacking Researchers With New Hacking Tools

Iranian Mint Sandstorm Attacking Researchers With New Hacking Tools

Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information. The threat actors can exploit this information for various illicit purposes like economic espionage, competitive advantage, or...
Hacker from ShinyHunters Group Arrested for Breaching 60+ Organizations

22-yr Old Hacker from ShinyHunters Group Arrested for Hacking 60+ Organizations

A 22-year-old French citizen, Sebastian Raoult, has been sentenced to three years in prison and ordered to pay over $5 million in restitution for his role in a sprawling cybercrime ring that hacked and...
Microsoft Disabled App Installer that Abused by Hackers to Install Malware

Microsoft Disabled App Installer that Abused by Hackers to Install Malware

Threat actors, particularly those with financial motivations, have been observed spreading malware via the ms-appinstaller URI scheme (App Installer). As a result of this activity, Microsoft has disabled the ms-appinstaller protocol handler by default. “The...
Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data

Hackers’ Leaksmas Darkweb Event Exposes Massive Hacked Data

As carols resonated in the air and families convened, the cyber underworld ushered in a chilling twist to Christmas – 'Leaksmas,' a season marked by rampant data dumps targeting individuals and organizations worldwide.  Resecurity, a...
MongoDB Suffers Security Breach, Exposing Customer Data

MongoDB Cyber Attack, Customer Data Exposed

MongoDB has experienced a security incident in which unauthorized access to its corporate systems was identified. However, the company confirmed that there was no evidence of access to any customer's system logs. MongoDB is...
New Underground Market OLVX Advertising Wide Variety of Hacking Tools 

New Dark Web Market OLVX Advertising Variety of Hacking Tools 

Threat actors exploit underground markets by purchasing or selling stolen data, malware, and hacking tools to facilitate cybercrime.  These underground markets provide the following key facilities among threat actors that fuel the growth of cyber...
Hackers hijacked an Irish water utility and interrupted the Water Supply

Hackers Hijacked Water Facility that Interrupted the Supply

Recently, there was a cyberattack on an Irish water utility that resulted in hackers gaining control of the system and disrupting the water supply. Last week, a private group water system in the Erris...
Return of Genesis Market: Hackers Exploited Node.js and EV code signing

Genesis Market Technique: Hackers Exploited Node.js and EV Certificates

In the labyrinthine landscape of cyber threats, the Trend Micro Managed XDR team has uncovered a malevolent symphony echoing the tactics employed by the infamous Genesis Market.  Trend Micro Managed XDR, or Extended Detection and...
Hackers Exploiting Zimbra 0-day to Attack Government Organizations

Hackers Exploiting Zimbra 0-day to Attack Government Organizations

Zimbra Collaboration is an open-source solution software suite with an email server and web client for collaboration.  Over 5,000 companies and public sector users, along with hundreds of millions of end-users in more than 140...

Managed WAF

Website

Latest News