EHA
State-Sponsored Hackers Employ ChatGPT in Cybercrime Schemes, Microsoft Reports

State-Sponsored Hackers Employ ChatGPT in Cybercrime Schemes, Microsoft Reports

Advanced Persistent Threat (APT) groups have been adopting and leveraging Artificial Intelligence (AI) to enhance their productivity and evade security measures employed by defenders. With the help of their security cooperation, Microsoft and OpenAI are...
Chinese Hackers Attacking U.S. Critical Infrastructure Since 2023

Chinese Hackers Attacking U.S. Critical Infrastructure Since 2023

VOLTZITE, a designated threat group, has been discovered by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which overlaps with the Volt Typhoon threat group. This particular threat actor has been targeting since early...
ANY.RUN Threat Intelligence

ANY.RUN Threat Intelligence Lookup Tool – A Repository of Millions of Malware IOCs 

Malware sandbox leader ANY.RUN introduced the Threat Intelligence Lookup platform that helps security researchers find the relevant threat data from the sandbox tasks of ANY.RUN. The platform aids in identifying and studying various types of...
WhatsApp Privacy Flaw Devices Information to Any Other User

WhatsApp Privacy Flaw Devices Information to Any Other User

Hackers seek to exploit WhatsApp flaws to gain unauthorized access to user data, messages, and sensitive information.  Exploiting these flaws allows threat actors to compromise user privacy, conduct espionage, and engage in malicious activities. Recently, a...
Hackers Modifying Registry Keys and Establishing Persistence via Scheduled Tasks

Hackers Modifying Registry Keys to Establish Persistence via Scheduled Tasks

Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections whenever they require. One of the key methods used to maintain persistence is the...
Recruiters Beware! Hackers Deliver Malware Posing as Job Applicant

Recruiters Beware! Hackers Deliver Malware Posing as Job Applicant

Threat actors have been targeting recruiters disguised as job applicants to deliver their malware. Though this method is not unique, the technique and attack vectors have been noted to have changed from their previous...
New Editbot Stealer in Action; Stealing Browser Passwords & Cookies

New Editbot Stealer in Action; Stealing Browser Passwords & Cookies

A new malicious campaign, Editbot Stealer, was discovered in which threat actors use WinRAR archive files with minimal detection to perform a multi-stage attack. Threat actors have been utilizing the theme of "defective product...
Notepad++ Input Validation Flaws Leads to uncontrolled Search Path Vulnerability

Notepad++ Input Validation Flaws Leads to uncontrolled Search Path Vulnerability

Notepad++ has been discovered with an uncontrolled search path vulnerability, which could allow threat actors to search an untrusted search path. This vulnerability has been disclosed to Notepad++, and a patch has yet to...
Okta Hack customer Data

Okta Hack: Threat Actors Downloaded all Customer Support System Users’ Data

In a pivotal update to the Okta security incident divulged in October 2023, Okta Security has unearthed additional intricacies surrounding the unauthorized intrusion into its customer support system.  This revelation holds profound implications for the...
SysJoker Critical Industrial Sectors

APT Hackers Behind SysJoker Attacking Critical Industrial Sectors

SysJoker malware was initially discovered to be used by the APT group dubbed "WildCard" and targeted Israel's educational sector. However, the operations of this APT threat actor have expanded to include additional malware variants,...

Managed WAF

Website

Latest News