EHA
Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers Attacking ERP Server To Deploy Proxy And VPN Services

Hackers often attack ERP servers, as these servers contain crucial information about a company's activities and operations, its customers, and various business processes in the organization. Compromising an ERP server can enable a threat actor...
BadSpace Malware High Ranking Sites

BadSpace Malware Attacking Users By Leveraging High-Ranking Infected Websites

Hackers abuse high-ranking infected websites to leverage their established credibility and large user base to spread malware, launch phishing attacks, or redirect traffic to malicious sites. While exploiting such trusted infected platforms they can now...
Bondnet Using High-Performance Bots For C2 Server

Bondnet Using High-Performance Bots For C2 Server

Threat actors abuse high-performance bots to carry out large-scale automated attacks efficiently. These bots can work quickly, flood systems, steal information, and conduct and orchestrate sophisticated cyber operations largely autonomously. Cybersecurity researchers at ASEC recently discovered...
Hackers Compromise 20k FortiGate Systems

Chinese Hackers Compromised 20K FortiGate Systems worldwide

At the beginning of 2024, there were reports of Chinese threat actors targeting FortiGate systems with COATHANGER malware. However, it has been discovered that the Chinese cyber espionage campaign had much more extensive capabilities than...
Critical Vulnerabilities In Netgear Routers Let Attackers Bypass Authentication

Critical Vulnerabilities In Netgear Routers Let Attackers Bypass Authentication

Security analysis identified multiple vulnerabilities in the Netgear WNR614 JNR1010V2 N300 router (firmware V1.1.0.54_1.0.1) that could allow attackers to bypass authentication and access the router's administrative interface.  This is due to improper authentication protocols and...
Ransomware Actor Exploited CoinMiner Attacker’s Proxy Server

Ransomware Actor Exploited CoinMiner Attacker’s Proxy Server

Hackers can hide their names and access blocked websites or networks by using proxy servers, which help make these systems anonymous.  Compromised proxy servers can be employed as pipes for launching attacks, circulating malicious software,...
TP-Link Archer C5400X Router Flaw Let Attacker Hack Devices Remotely

TP-Link Archer C5400X Router Flaw Let Attacker Hack Devices Remotely

Hackers often target routers as the gateways that connect devices and networks to the internet. Besides this, they are lucrative targets for threat actors since they are often overlooked regarding security updates and patches. Cybersecurity researchers...
Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Chinese Hackers Using ORB Proxy Networks For Stealthy Cyber Attacks

Researchers found that cyber espionage groups with ties to China are increasingly using complicated proxy networks called Operational Relay Box (ORB) networks. These networks are made up of mesh networks made from hacked devices...
APT Hackers Attacking Manufacturers With Keyloggers, Infostealers, And Proxy Tools

APT Hackers Attacking Manufacturers With Keyloggers, Infostealers, And Proxy Tools

The Andariel APT group launched a targeted attack campaign against South Korean domestic companies and institutions, where manufacturing, construction, and educational sectors were hit.  The attackers deployed backdoors like Nestdoor, keyloggers, infostealers, and proxy tools...
Critical SAP NetWeaver & CX Commerce

Critical SAP NetWeaver & CX Commerce Flaw Leads To Complete Takeover

Three vulnerabilities associated with CSS injection, file upload, and remote code execution have been discovered in the SAP Customer Experience (CX) commerce cloud and SAP Netweaver Application. These two vulnerabilities have been assigned with CVE-2019-17495...

Managed WAF

Website

Latest News