EHA
Home Information Security

Information Security

Authorities Warns Of North Korean Attackers Stealing Military Technologies

Authorities Warns Of North Korean Attackers Stealing Military Technologies

Threat actors target military technologies to gain a strategic advantage, access classified information, and compromise national security.  Recently, Germany's BfV and South Korea's NIS and CSA issued a second advisory on North Korean cyber actors...
MOBILE And WIRELESS Mysterious ‘MMS Fingerprint’ Hack Used By Spyware Firm NSO Group Revealed

NSO Group’s Mysterious MOBILE & WIRELESS ‘MMS Fingerprint’ Hack Revealed

The "MMS Fingerprint" attack, a previously unidentified mobile network attack purportedly employed by spyware company NSO Group, is referenced in a single sentence in an agreement between NSO and Ghana's telecom regulator. Because the hack...
Attackers Can Bypass Windows Security Using New DLL Hijacking Technique

Attackers Can Bypass Windows Security Using New DLL Hijacking Technique

Threat actors using the DLL Hijacking technique for persistence have been the order of the day and have been utilized in several attacks. This attack method allows bypassing the privilege requirement for executing certain...
How To Create And Develop Android TV Apps

How To Create And Develop Android TV Apps

Today, Android TV is a leading and widely recognized operating system on the market. However, building an Android TV app takes time due to specific features, the complexity of back-end integration, and the need...
What is a Security Operations Center (SOC)? A Detailed Overview

What is a Security Operations Center (SOC)? A Detailed Overview

In this article, we will explore the concept of a Security Operations Center (SOC) in greater detail, including its functions, benefits, and key components. In today's digital world, cyber security risks are becoming increasingly serious....
SideWinder State-Sponsored Hacker Group

Notorious State-Sponsored Hacker Group Stealthy Infrastructure Uncovered

Group-IB's cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their targets mainly encompassed entities situated in:-  Pakistan China In a collaborative report, cybersecurity firms Group-IB and Bridewell...
Image source: Pexels

5 Best Practices For Safeguarding Confidential Patient Information

Safeguarding confidential patient information is getting more complicated today. Technology is playing an integral role when it comes to how we document our patients, manage their records, schedule their visits, and handle prescriptions and...
Biometric Authentication

What is Biometric Authentication? History, Types & How it Works?

Biometric authentication has applications ranging from mobile phone access to airport security. The term "biometrics" is derived from the Greek words "bio" (life) and "metrics" (to measure). Therefore, the literal meaning of biometrics is the measurement...
YouTube as a Malware

Hackers Using YouTube as a Malware Distribution Platform Via Hacked YT Channel

Morphisec Threat Labs researchers have recently exposed a sneaky loader called "in2al5d p3in4er" (Invalid Printer) that delivers Aurora information stealer malware through YouTube videos. Using an advanced anti-VM technique, the in2al5d p3in4er loader, built with...
Microsoft security updates

Microsoft Fixed A Windows 0-Day Along With 96 Other Vulnerabilities

Microsoft released a security update under patch Tuesday for April and fixed 97 vulnerabilities affecting various products, including a Windows zero-day bug that was exploited for ransomware attacks. The Microsoft security updates contain fixes for...

Managed WAF

Website

Latest News