EHA
Home Search

ransomware - search results

If you're not happy with the results, please do another search
Linkedin Database

Refined Database of 88K U.S. Business Owners Linkedin Data has been Posted in a...

Data of over 700M LinkedIn users was posted on a hacker forum for sale last week but again a 68MB of JSON database containing...
How to Improve Cybersecurity for Your Business?

How to Improve Cybersecurity for Your Business?

Having a solid website security plan is essential for your business because it will help you keep cyber thieves and hackers at bay. In...
Mercedes-Benz data breach

Mercedes-Benz Exposed Credit Card Information, Social Security Numbers, and Driver license

Mercedes-Benz USA (MBUSA is headquartered in Atlanta. This is the huge office that is responsible for the distribution, marketing, and customer service for all...
Most Dangerous APT Hacker Group’s Deadly Cyber Attacks of the Year 2021- Complete Collection

Most Dangerous APT Hacker Group’s Deadly Cyber Attacks of the Year 2021- Complete Collection

The APT advanced persistent threat is known for launching sophisticated attacks to steal sensitive, financial information and stay undetected within the infrastructure. In this...
SOC1 vs SOC2 – Cyber Threat Intelligence Guide

SOC1 vs SOC2 – Cyber Threat Intelligence Guide

Security Operations Center (SOC), which I call SOC1, is a standard group of Analysts who analyze an incident/alert created from a security product. For...
Latvian Women Charged

Latvian Women Charged for her Role in Creating and Deploying Banking Malware Trickbot

A 55-year-old Latvian woman Alla Witte was charged for her role in writing code for Trickbot malware and ransomware suite for the malware. The TrickBot...
Cybercriminals Running Contest

Cybercriminals Running Contest – $115,000-Prize for New Cryptocurrency Hacks

In the 2021 RSA conference, the best cybersecurity industry came together to present numerous ideas on how to stop cybercriminals from carrying out their...
ToxicEye RAT

ToxicEye RAT Uses Telegram Communications to Steal Data from Victims and to Perform Malicious...

Researchers at Check Point Software Technologies found that hackers are leveraging the popular Telegram messaging app by embedding its code inside a remote access...
Stolen Blueprints of Apple

Hackers Threaten to Leak Stolen Blueprints of Apple products if $50 Million isn’t Paid

Apple supplier Quanta has reportedly fallen victim to a ransomware attack from the Russian hacking group REvil, which is now threatening to leak Blueprints...
Beware of New Monero Mining Campaign that Uses ProxyLogon Exploit to Compromise Exchange Servers

Beware of New Monero Mining Campaign that Uses ProxyLogon Exploit to Compromise Exchange Servers

Microsoft already released details about a serious vulnerability affecting their Exchange mail server software, a range of threat actors have been targeting exploitable servers...

Managed WAF

Website

Latest News