EHA
Home Information Security

Information Security

New Android Rafel RAT Takes Complete Control Of Your Android Device

New Android Rafel RAT Takes Complete Control Of Your Android Device

Android has many features and access to apps but is prone to security risks due to its open-source nature. Android malware, viruses, Trojans, ransomware, spyware, and adware programs threaten the data privacy and integrity of...
UEFI Flaw Intel Impact

UEFIcanhazbufferoverflow Flaw In Intel Processors Impacts 100s of PCs & Servers

The Phoenix SecureCore UEFI firmware has discovered a new vulnerability, which runs on several Intel Core Desktop and mobile processors. This vulnerability has been assigned CVE-2024-0762, and its severity has been given as 7.5 (High). This...
New ScriptBlock Smuggling Attack Let Ackers Bypass PowerShell Security Logs And AMSI

New ScriptBlock Smuggling Attack Let Ackers Bypass PowerShell Security Logs And AMSI

Ever since the introduction of PowerShell v5, there have been less usage of the application specifically among threat actors, penetration testers and red teamers. This is because PowerShell v5 introduced PowerShell security logging which allows...
SmokeLoader – A Modular Malware With Range Of Capabilities

SmokeLoader – A Modular Malware With Range Of Capabilities

Hackers misuse malware for diverse illicit intentions, including data theft, disrupting systems, espionage, or distortion for unethical monetary benefits. Besides this malware is also helpful in conducting cyber warfare or receptive intelligence by the nation-state...
VS Code Marketplace Flaw Let Attackers Include Malicious Extensions

VS Code Marketplace Flaw Let Attackers Include Malicious Extensions

Researchers identified security vulnerabilities in the VS Code Marketplace that could be exploited by malicious actors, as these flaws allowed extensions with malicious dependencies to gain credibility (through high install numbers) and access to...
Navigating The Digital Storm – Unveiling The Power Of ITDR

Navigating The Digital Storm – Unveiling The Power Of ITDR

In the complicated maze of the digital age, where unexpected shocks lurk like malicious gremlins around every corner, organisations are yearning for a courageous hero to protect them from the approaching disaster. Enter IT...
Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation

Hackers Attempted To Takeover JavaScript Project From OpenJS Foundation

Attackers tried to take over the JavaScript project from OpenJS Foundation, which is home to JavaScript projects utilized by billions of websites globally.  This is similar to the incident that was recently disclosed and targeted at...
NSA CISA AI Security Guidelines

NSA, CISA Released Guidance And Best Practices To Secure The AI

In an era where artificial intelligence (AI) systems are becoming increasingly integral to our daily lives, the National Security Agency’s Artificial Intelligence Security Center (NSA AISC) has taken a significant step forward in enhancing...
Apache Kafka Flaw Let Attackers Gain Access To Sensitive Data

Apache Kafka Flaw Let Attackers Gain Access To Sensitive Data

A new incorrect access control vulnerability has been discovered in Apache Kafka that could allow threat actors to compromise the CIA (Confidentiality, Integrity, and Availability) on the affected resource.  This vulnerability has been assigned to...
300,000 Chinese Devices in US : 40% Increase Despite Official Bans

300,000 Chinese Devices in US : 40% Increase Despite Official Bans

Chinese devices are suspected of administering cyber espionage due to concerns over potential backdoors, supply chain vulnerabilities, and the risk of tampering.  State-sponsored cyber threats, such as viral memes, are becoming more frequent. Chinese devices have...

Managed WAF

Website

Latest News