EHA
The Biggest I.T. Threats Of The Future

The Biggest I.T. Threats Of The Future

Cybersecurity has come to represent one of, if not the largest, threats to businesses. Below is a list of the most pressing ones to be aware of so that you can plan and stay...

Hundreds of Fake Online Shoe Stores Injected With Credit Card Skimmer To Steal User...

Hundreds of online web stores that sell counterfeit goods are affected by credit card skimmer that aimed to steal the customer credit card details. Several counterfeit online shoe stores offer great deals for the popular...
Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Hackers Steal Outlook Passwords Via Overlay Screens on Legitimate Sites

Nowadays, the phishing attacks are increasing at an alarming rate, and these attacks are drastically affecting and harming the business organization. Recently, the cybersecurity researchers have detected a phishing campaign in which the attackers...
Hackers Abuse Microsoft Build Engine

Hackers Abuse Microsoft Build Engine to Deliver Password-Stealing Malware Filelessly

Anomali Threat Research recognized a campaign in which threat actors used Microsoft Build Engine (MSBuild) to filelessly deliver Remcos remote access tool (RAT) and password-stealing malware commonly known as RedLine Stealer. Threat actors used MSBuild,...
Kubernetes Clusters Compromised

Over 50,000 Ips Across Multiple Kubernetes Clusters Were Compromised By the TeamTNT Threat Actors

Researchers from Trend Micro disclosed that close to 50,000 IPs were compromised across multiple Kubernetes clusters in a cryptojacking campaign conducted by the TeamTNT group. Kubernetes, developed and backed by Google, is one of the...
Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Beware of a New Malware Campaign that Hides Malicious code within BMP Image

Lazarus APT is one of the most sophisticated North Korean Threat Actors that has been active since at least 2009. This actor is known to target the U.S., South Korea, Japan, and several other countries....
Security Flaws Russian Hackers

Top 12 Security Flaws Exploited by Russian Hackers to Target Organisations Globally

A joint advisory by the US Department for Homeland Security's Cybersecurity Infrastructure Security Agency (CISA), FBI, and the National Security Agency (NSA), as well as the UK National Cyber Security Centre warned organizations about...
RAT Uses Autohotkey

A New Unique RAT Heavily Uses The Autohotkey Scripting Language On An Ongoing Malware...

The Morphisec Labs team has tracked a unique and ongoing RAT delivery campaign that heavily uses the AutoHotKey scripting language, a fork of the AutoIt language that is frequently used for testing purposes. Researchers identified...
Signature-Based Detection

Why Signature-Based Detection Struggles to Keep Up with the New Attack Landscape?

Signature-based detection has been the cornerstone of the security strategy of organizations for a long. Thanks to rapid technological advancements, attackers constantly find ways to evade and subvert defense mechanisms and traditional security tools....
Beware of Pirated Software Sites That Installs Malware in your Computer

Beware of Pirated Software Sites That Installs Malware in your Computer

As per Raccoon Stealer, it has been found that the malware is being distributed by the website network which acts as a “dropper as a service”. They are serving different types of malware packages...