EHA
Researchers Uncover the Bond between the Infamous Remcos RAT  and GuLoader

Researchers Uncover the Bond Between the Infamous Remcos RAT and GuLoader

There have been two instances of software distributors that have disguised themselves as having legitimate purposes but were actually operating with malicious intent. Threat actors adopting the use of two software, GuLoader (also known as...
Multiple Trend Micro Endpoint Security Vulnerabilities Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

If you are using Trend Micro Apex One, be aware that there may be a vulnerability in the third-party Antivirus uninstaller module. This vulnerability could potentially allow for arbitrary code execution. While the National Vulnerability...
Threat and Vulnerability Roundup

Threat and Vulnerability Roundup For The Week Of 10th to September 16th

This week's Threat and Vulnerability Roundup from Cyber Writes brings you the most recent cybersecurity news.  The most recent attack methods, critical flaws, and exploits have all been emphasized. To keep your devices safe, we...
Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns. The rapid modernization of generative AI and its AI counterparts will transform the complete future of...
4 Cyber Attacks that Frequently Evade Detection and How to Address Them

4 Cyber Threats that Frequently Evade Detection and How to Address Them

Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily breeze through at least the initial...
Threat Actors Mimic Popular IT Tools to Deliver Malware Stealthily

Threat Actors Mimic Popular IT Tools to Deliver Malware Stealthily

Threat actors are known to use several methods to lure victims into their websites and make them download their malicious payload, which will allow them to take full control of the system.  However, a recent...
DarkWatchMan RAT Hides in Windows Registry

Beware! DarkWatchMan RAT Hides in Windows Registry

A phishing website impersonating the popular Russian site CryptoPro CSP has been detected by the Cyble Research and Intelligence Labs (CRIL) in a recent discovery. The distribution of DarkWatchman malware was being carried out by...
threat hunting tools

20 Best Threat Hunting Tools – 2023

Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints. The approach requires researching deeply into the environment to locate malicious activity. To prevent these types of attacks, threat...
Bot Protection Software

10 Best Bot Protection Software – 2023

Bot protection software or bot mitigation software plays a vital role in protecting websites and web apps from malicious traffic. A ‘bot’ (short for robot), is a software program that performs automated, repetitious, pre-defined tasks....
Best UTM solutions

10 Best UTM Software (Unified Threat Management Solutions) – 2023

Unified Threat Management software or UTM software (UTM solutions) is best known to address network threats and malicious activities on enterprise networks. With Best UTM software, you are provided with a comprehensive and dynamic...

Unified Endpoint Management

EHA

Managed WAF

Website

Latest News