EHA
threat hunting tools

20 Best Threat Hunting Tools – 2024

Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints. The approach requires researching deeply into the environment to locate malicious activity. To prevent these types of attacks,...
DarkWatchMan RAT Hides in Windows Registry

Beware! DarkWatchMan RAT Hides in Windows Registry

A phishing website impersonating the popular Russian site CryptoPro CSP has been detected by the Cyble Research and Intelligence Labs (CRIL) in a recent discovery. The distribution of DarkWatchman malware was being carried out by...
Threat Actors Mimic Popular IT Tools to Deliver Malware Stealthily

Threat Actors Mimic Popular IT Tools to Deliver Malware Stealthily

Threat actors are known to use several methods to lure victims into their websites and make them download their malicious payload, which will allow them to take full control of the system.  However, a recent...
4 Cyber Attacks that Frequently Evade Detection and How to Address Them

4 Cyber Threats that Frequently Evade Detection and How to Address Them

Some cyberattacks are just more evasive than others. While many attacks can be identified and blocked through a system that relies on threat signatures, many cannot and easily breeze through at least the initial...
Loader Malware Steal Sensitive Data

Loader Malware Steal Sensitive System Data & Installs Other Malware

In the intricate dance of cybersecurity threats, loader malware emerges as a silent force, discreetly breaching unsuspecting systems and setting the stage for more sophisticated onslaughts.  Despite its subtle nature, this malicious entity possesses a...
Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

Hackers Using ChatGPT to Generate Malware & Social Engineering Threats

Large language models (LLMs) and generative AI are rapidly advancing globally, offering great utility but also raising misuse concerns. The rapid modernization of generative AI and its AI counterparts will transform the complete future of...
Threat and Vulnerability Roundup

Threat and Vulnerability Roundup For The Week Of 10th to September 16th

This week's Threat and Vulnerability Roundup from Cyber Writes brings you the most recent cybersecurity news.  The most recent attack methods, critical flaws, and exploits have all been emphasized. To keep your devices safe, we...
Multiple Trend Micro Endpoint Security Vulnerabilities Let Attackers Run Arbitrary Code

Trend Micro Zero-day Vulnerability Let Attackers Run Arbitrary Code

If you are using Trend Micro Apex One, be aware that there may be a vulnerability in the third-party Antivirus uninstaller module. This vulnerability could potentially allow for arbitrary code execution. While the National Vulnerability...
Researchers Uncover the Bond between the Infamous Remcos RAT  and GuLoader

Researchers Uncover the Bond Between the Infamous Remcos RAT and GuLoader

There have been two instances of software distributors that have disguised themselves as having legitimate purposes but were actually operating with malicious intent. Threat actors adopting the use of two software, GuLoader (also known as...
Maltego’s New SSL Certificate Spotter to Detect Suspicious Certificate

Maltego’s New SSL Certificate Spotter to Detect Suspicious Certificate

As the world becomes more reliant on technology, the importance of cybersecurity cannot be overstated. Being proactive in identifying and mitigating potential threats is crucial to protecting sensitive information and preventing devastating cyber attacks....

Managed WAF

Website

Latest News