EHA
Home Search

Ransomware - search results

If you're not happy with the results, please do another search
Webwyrm Malware Attacking Over 100,000 Users Across 50 Countries

Webwyrm Malware Affects More Than 100,000 Users in 50 Countries

Threat actors are evolving their Tactics, Techniques, and Procedures (TTPs) at an alarming rate.  With technological advancements and increased awareness of cybersecurity measures, they continually...
OpenAI Said to be Making its own AI Chips

OpenAI is Reportedly Developing its Own AI chips

The maker of ChatGPT, OpenAI, is looking at making its own artificial intelligence chips, which are necessary for operating the highly popular chatbot. Those acquainted...
MGM Resorts Refused

MGM Resorts Refused to Pay Hackers’ Ransom Demand in Cyberattack

In recent news, MGM Resorts International took a bold stance in the face of a cyberattack, refusing to give in to ransomware hackers who...
GoldDigger Disguises as Fake Android App To Steal Banking Credentials

GoldDigger Disguises as Fake Android App To Steal Banking Credentials

GoldDigger, a new Android Trojan, imitates a fraudulent Android application and has been discovered to spoof both a Vietnamese government portal and a local...
Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Threat Actors Employ Remote Admin Tools to Gain Access over Corporate Networks

Recently, threat actors have adapted tactics, exploiting the appeal of banned apps in specific regions, making users more susceptible to cyberattacks through cleverly crafted...
Why Choose When You Can Have Both? IT Management OR IT security

Why Choose When You Can Have Both? IT Management OR IT security

Forget about security versus productivity! The tug-of-war between management and security solutions to coexist in a single endpoint is the next big thing. But...
Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User

Cisco Emergency Responder Vulnerability Let Remote Attacker Login as Root User

Cisco was reported with a critical vulnerability that could allow threat actors to log in to the affected devices as a root account. The...
Zero-Days for Hacking WhatsApp Are Now Worth Millions of Dollars

Zero-Day WhatsApp Hacking Vulnerabilities Worth Millions

Securing the devices running iOS and Android operating systems is now costly due to improved defenses.  According to a recent report by TechCrunch, there has...
Supershell – Open-Source Botnet That Obtain SSH Shell Access

Supershell – Open-Source Botnet That Obtain SSH Shell Access

The digital age offers opportunities but also increases the importance of cybersecurity as threats grow in complexity and sophistication, making preparedness a top priority. Open-source...
Threat Actors Deployed Hundreds of Python Packages to Steal System Data

Threat Actors Deployed Hundreds of Python Packages to Steal System Data

In the open-source ecosystem, shadows shift as collaboration succeeds, attracting both novices and skilled threat actors. A rising threat has been evolving and sharpening...

Managed WAF

Website

Latest News