EHA
Home Search

DDoS - search results

If you're not happy with the results, please do another search
Hackers Exploiting 0-day RCE Flaws in the Wild to Deploy Mirai Malware

Hackers Exploiting 0-day RCE Flaws in the Wild to Deploy Mirai Malware

The Mirai botnet is a malicious network of infected computers, routers, and IoT devices harnessed by cybercriminals to launch large-scale DDoS attacks.  The destructiveness of...
Microsoft Defender Bounty Program: Rewards up to $20,000 USD

Microsoft Defender Bounty Program: Rewards up to $20,000 USD

Microsoft has launched the Defender Bounty Program, which aims to improve the security of its customers' experience by incentivizing researchers with rewards of up...
Rhysida Ransomware Attacking Windows Machine Through VPN Devices and RDP

Rhysida Ransomware Attacking Windows Machine Through VPN Devices and RDP

Rhysida, a new ransomware group, hit its first victim in May 2023. They use their ransomware, offered as RaaS (Ransomware-as-a-Service), with at least 50...
CISA Releases Cyber Attack Mitigation for Healthcare Organizations

CISA Releases Cyber Attack Mitigation for Healthcare Organizations

In an era marked by persistent cyber threats, the Cybersecurity and Infrastructure Security Agency (CISA) has released a cyber attack Mitigation Guide specifically tailored...
LummaC2 Malware Tracks Computer Mouse Movements Using Trigonometry

LummaC2 Employs Trigonometry to Track Mouse Movements

MaaS (Malware-as-a-Service) thrives as a top choice for new cyber threats, offering easy access to powerful tools. Threat actors primarily focus on information theft...
Hackers Attacking Apache Web Servers to Install Coinminers

Hackers Attacking Apache Web Servers to Install Coinminers

An attack campaign that installs XMRig Coinminer on Windows web servers that run on Apache has been discovered recently. The threat actors used the...
Nessus Vulnerability Let Attackers Alter Rules Variables

Nessus Vulnerability Let Attackers Alter Rules Variables

An arbitrary file write vulnerability has been discovered in Nessus, which allows an authenticated, remote attacker to perform a denial of service condition on...
Apache ActiveMQ Vulnerability

Hackers Infect Linux Machines with Rootkits via Apache ActiveMQ Vulnerability

Apache ActiveMQ is a Java-based open-source protocol that allows distributed applications to exchange messages. It uses the JMS API to provide a dependable messaging platform...
LitterDrifter Powershell Worm Rapidly Spreads on USB Drives by Itself

LitterDrifter Powershell Worm Rapidly Spreads on USB Drives by Itself

Gamaredon (aka Primitive Bear, ACTINIUM, and Shuckworm) stands out in Russian espionage by exclusively targeting Ukrainian entities. Unusually evident, it challenges researchers seeking evidence...
Splunk RCE Vulnerability

Splunk RCE Vulnerability Let Attackers Upload Malicious File

A high-severity Remote Code Execution (RCE) flaw in Splunk Enterprise has been discovered, enabling an attacker to upload malicious files. Versions of Splunk Enterprise less than...

Managed WAF

Website

Latest News