EHA
Iranian Mint Sandstorm Attacking Researchers With New Hacking Tools

Iranian Mint Sandstorm Attacking Researchers With New Hacking Tools

Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information. The threat actors can exploit this information for various illicit purposes like economic espionage, competitive advantage, or...
Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Crypto Hack Let Hackers Stolen $160 Million From Crypto Firm Wintermute

Wintermute, a crypto trading firm, has been targeted in the latest crypto heist to steal more than $160 million in digital assets. Only DeFi operations were affected by this hack, while lending and over-the-counter (OTC)...
UNC3944 Hackers Acquire Corporate Logins Using SMS Phishing And Support Desk Calls

Hackers Acquire Corporate Logins From SMS Phishing And Support Desk Calls

A financially driven threat group, UNC3944 has frequently employed phone-based social engineering and SMS phishing attacks to gain credentials and escalate access to target organizations. The hacking group has been observed to target a wide range...
IT Security Analyst Jailed

IT Security Analyst Jailed for Impersonating as a Hacker in Own Company

A 28 years old Former IT security analyst of an Oxford-based company has been sentenced to three years for deceiving the company to extort money. On 27 February 2018, the man impersonated a ransomware group...
BlackTech APT Hackers Attacking Network Routers to Breach Corporate Networks

BlackTech APT Hackers Attacking Network Routers to Breach Corporate Networks

Hackers called BlackTech APT have been doing bad things since 2010. They attack places like the government, factories, technology, media, electronics, phones, and the military. The group behind the attack employs custom-made malicious software, tools...
Kubernetes Security Flaw Let Attackers escalate to admin privileges

Kubernetes Security Flaw Let Attackers Escalate to Admin Privileges

A new privilege escalation vulnerability has been discovered in Kubernetes, which allows threat actors to gain administrative privileges on affected pods. The CVE for this vulnerability has been assigned as CVE-2023-3676, and the severity...
Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars

Zero-Day WhatsApp Hacking Vulnerabilities Worth Millions

Securing the devices running iOS and Android operating systems is now costly due to improved defenses.  According to a recent report by TechCrunch, there has been a surge in the demand for zero-day exploits that...
Hackers Use Compromised Routers to Attack Government Organizations

Hackers Use Compromised Routers to Attack Government Organizations

Attackers continue to use compromised routers as malicious infrastructure to target government organizations in Europe and the Caucasus region. APT28 threat actors (also known as Sofacy, Fancy Bear, etc.) were behind this malicious espionage effort, according to...
D-Link Hacked: Hackers Steal Source Code and Customer Personal Information

D-Link Hacked: Hackers Steal Source Code and Customer Personal Information

D-Link Corporation, a multinational company that provides innovative networking solutions for both consumer and business markets around the world, has been accused of suffering a data breach. The claim, posted by an unauthorized third party...
How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship

How Hackers Abusing ChatGPT Features For Their Cybercriminal Activities – Bypass Censorship

Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT.  But, besides its innovative part, cybercriminals have also actively exploited these generative AI models for several illicit purposes,...

Managed WAF

Website

Latest News