EHA
Beware of Stealthy Raspberry Robin That Delivered as a Windows Component

Beware of Stealthy Raspberry Robin That Delivered as a Windows Component

Raspberry Robin is a malicious worm that spreads through USB drives, and it's been actively used by the threat actors to download and install hidden malware on Windows systems.  Besides this, the threat actors exploit...
Hackers use Pirated Apps to Hack macOS Machine & Install Malware

Hackers use Pirated Apps to Hack macOS Machine & Install Malware

Beware! Your free download from the torrent sea might come with a hidden price: backdoor malware.  Researchers at Kaspersky have discovered a widespread macOS malware targeting users who download cracked copies of popular software This insidious...
VileRAT Attacking Windows Machines via Malicious Software

VileRAT Attacking Windows Machines via Malicious Software

A new variant of VileRAT is being distributed through fake software pirate websites to infect Windows systems on a large scale. This Python-based VileRAT malware family is believed to be specific to the Evilnum threat group,...
MyFlaw – Opera Bug Let Hackers Run ANY File on Mac or Windows

MyFlaw – Opera Bug Let Hackers Run ANY File on Mac or Windows

Hackers exploit Remote Code Execution (RCE) vulnerabilities as they allow them to execute arbitrary code on a target system remotely. This unauthorized access enables the threat actors to take control of the system and perform...
Silver RAT Evades Anti-viruses to Hack Windows Machines

Silver RAT Evades Anti-viruses to Hack Windows Machines

Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim's computer remotely. These malicious tools allow hackers to perform various malicious activities like the following without the user's knowledge:- Execute commands Steal...
Attackers Can Bypass Windows Security Using New DLL Hijacking Technique

Attackers Can Bypass Windows Security Using New DLL Hijacking Technique

Threat actors using the DLL Hijacking technique for persistence have been the order of the day and have been utilized in several attacks. This attack method allows bypassing the privilege requirement for executing certain...
Kimsuky Group Using Weaponized LNK File to Deploy AppleSeed Malware

Kimsuky Group Using Weaponized LNK File to Deploy AppleSeed Malware

Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can be executed when the user clicks on the shortcut. These weaponized files allow threat actors...
Ransomware Attackers Exploit Windows Zero-day to Exploit Privileges

Ransomware Attackers Exploit Windows Zero-day to Exploit Privileges

Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way to bypass security measures. By exploiting these vulnerabilities, threat actors can escalate their privileges, enabling...
Iranian Hackers Developed a New Backdoor to Hack Windows

Iranian Hackers Developed a New Backdoor to Hack Windows

Peach Sandstorm, an Iranian Hackers group, targets diverse sectors globally, and this group is linked to:- APT33 Elfin Refined Kitten This nation-state group focuses primarily on the following sectors:- Aviation Construction Defense Education Energy Finance Healthcare Government Satellite Telecommunications In 2023, the group shows persistent interest in satellite, defense,...
PikaBot Attacking Windows machine via malicious search ads

PikaBot Attacking Windows Machine via Malicious Search Ads

In the labyrinth of cyber threats that define the digital landscape, 2023 has witnessed the resurgence of a particularly pernicious foe — malicious advertisements, colloquially known as "malvertising."  This nefarious stratagem has set its sights...

Managed WAF

Website

Latest News