© Ethical Hacking News Hubb All rights reserved.
Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.
Nov 23, 2023NewsroomSoftware Supply Chain Attack A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized...
Read moreThis event’s focus was getting more women to participate in bug bounty programs, as we noticed the community is relatively...
Read moreNov 22, 2023NewsroomSEO poisoning / Malware Analysis The macOS information stealer known as Atomic is now being delivered to target...
Read moreNov 21, 2023NewsroomCyber Attack / Cyber Espionage The China-linked Mustang Panda actor has been linked to a cyber attack targeting...
Read moreAn Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage,...
Read moreThe threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated...
Read moreNov 18, 2023NewsroomCyber Attack / USB Worm Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been...
Read moreNov 17, 2023NewsroomPatch Management / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws...
Read moreStepped-up SEC Enforcement Makes Proactive Security a MustThe SEC’s finalized cybersecurity rules, effective starting mid-December 2023, place a spotlight on...
Read moreNov 16, 2023NewsroomCyber Warfare / Threat Intelligence Russian threat actors have been possibly linked to what's been described as the...
Read moreBasically, NimExec is a fileless remote command execution tool that uses The Service Control Manager Remote Protocol (MS-SCMR). It changes...
Read moreRansomware is malicious software that infiltrates computer systems and encrypts valuable files, rendering them inaccessible to users. In recent years,...
Read moreDec 04, 2023NewsroomRansomware / Cyber Attack Microsoft has warned of a new wave of CACTUS ransomware attacks that leverage malvertising...
Read moreT3SF is a framework that offers a modular structure for the orchestration of events based on a master scenario events...
Read more© Ethical Hacking News Hubb All rights reserved.
Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.
© 2022 Ethical Hacking News Hubb All rights reserved.