Skip to content
  • Mon. May 23rd, 2022

Info Haunt

Hunt the Haunt

  • Cyber Security
  • Breaches
  • Threats
  • Malwares
  • Threat Hunting
  • Vulnerabilities
Top Tags
  • Malware
  • Ransomware
  • APT
  • darkweb
  • threat intelligence
  • Threat hunting
  • Microsoft

Latest Post

Microsoft Exchange server exploited by Squirrelwaffle malware Apple’s IOS with critical Zero-day Webkit Vulnerability  The Underrated 5Cs of Cyber Security You Need to Know   The Incredible Cyber Kill Chain model we Can’t Live Without The Ultimate Indian Army Faces Trojan Attacks from Android Malware
Breaches Cyber News Vulnerabilities

Microsoft Exchange server exploited by Squirrelwaffle malware

Feb 16, 2022 Michael
Cyber News Vulnerabilities

Apple’s IOS with critical Zero-day Webkit Vulnerability 

Feb 11, 2022 Michael
Cyber Security

The Underrated 5Cs of Cyber Security You Need to Know  

Feb 4, 2022 Michael
Cyber Security

The Incredible Cyber Kill Chain model we Can’t Live Without

Feb 2, 2022 Michael
Breaches Cyber News Malwares

The Ultimate Indian Army Faces Trojan Attacks from Android Malware

Jan 30, 2022 Michael
  • Latest
  • Popular
  • Trending
  • Microsoft Exchange server exploited by Squirrelwaffle malware
    Breaches Cyber News Vulnerabilities
    Microsoft Exchange server exploited by Squirrelwaffle malware
  • Apple’s IOS with critical Zero-day Webkit Vulnerability 
    Cyber News Vulnerabilities
    Apple’s IOS with critical Zero-day Webkit Vulnerability 
  • The Underrated 5Cs of Cyber Security You Need to Know  
    Cyber Security
    The Underrated 5Cs of Cyber Security You Need to Know  
  • The Incredible Cyber Kill Chain model we Can’t Live Without
    Cyber Security
    The Incredible Cyber Kill Chain model we Can’t Live Without
  • Microsoft Exchange server exploited by Squirrelwaffle malware
    Breaches Cyber News Vulnerabilities
    Microsoft Exchange server exploited by Squirrelwaffle malware
  • Cybersecurity tips for remote workers in COVID-19 Pandemic
    Cyber Security Malwares
    Cybersecurity tips for remote workers in COVID-19 Pandemic
  • Social Engineering Attacks – SMishing
    Cyber Security Malwares
    Social Engineering Attacks – SMishing
  • Cybersecurity Threat actor groups
    Breaches Cyber Security Malwares Phishing Threats
    Cybersecurity Threat actor groups
  • Microsoft Exchange server exploited by Squirrelwaffle malware
    Breaches Cyber News Vulnerabilities
    Microsoft Exchange server exploited by Squirrelwaffle malware
  • Apple’s IOS with critical Zero-day Webkit Vulnerability 
    Cyber News Vulnerabilities
    Apple’s IOS with critical Zero-day Webkit Vulnerability 
  • The Underrated 5Cs of Cyber Security You Need to Know  
    Cyber Security
    The Underrated 5Cs of Cyber Security You Need to Know  
  • The Incredible Cyber Kill Chain model we Can’t Live Without
    Cyber Security
    The Incredible Cyber Kill Chain model we Can’t Live Without
Breaches Cyber News Vulnerabilities

Microsoft Exchange server exploited by Squirrelwaffle malware

Feb 16, 2022 Michael

Squirrelwaffle targeted vulnerable exchange servers to spread malspam through hijacked email threads as reported by the Sophos tech. As per the experts, the Squirrelwaffle is a new malware loader that was discovered…

Cyber News Vulnerabilities

Apple’s IOS with critical Zero-day Webkit Vulnerability 

Feb 11, 2022 Michael

Apple has released an IOS update for Apple devices that fixes the CVE- 2022-22620 vulnerability in the WebKit browser engine that hackers would have already exploited in a wild. And they urge…

Cyber Security

The Underrated 5Cs of Cyber Security You Need to Know  

Feb 4, 2022 Michael

5Cs of Cyber Security Physical and logical Cyber security is the topmost priority for most enterprises today. The risk management plan for Cyber security is as essential as having a…

Cyber Security

The Incredible Cyber Kill Chain model we Can’t Live Without

Feb 2, 2022 Michael

The Cyber kill chain is the term which was initially started from the military, the military term as kill chain. Here cyber kill chain model has different stages of an…

Breaches Cyber News Malwares

The Ultimate Indian Army Faces Trojan Attacks from Android Malware

Jan 30, 2022 Michael

Recently security researchers have brought to a notice that an Android malware that pretends to be the legitimate ARMAAN (armaan.apk) application which would be developed by India’s govt related to…

Cyber News Cyber Security

The Devastating Environmental Impact of DHS Hacked by Suspected Russian Hackers

Jan 26, 2022 Michael

Department of Homeland Security (DHS) initially warns potential impact of the Russian cyberattacks on US locals and Government infrastructure. It was first reported by CNN that Russia maintains a range of offensive…

Breaches Cyber News

2022 first ransomware attack hit Schedulefly

Jan 5, 2022 Michael

The year 2022, the First ransomware attack which not many are talking about, but we will discuss the schedulefly ransomware attack, Schedulefly is an online cloud-based app that most industries…

Vulnerabilities

Log4J vulnerabilities explained easy

Dec 23, 2021 Michael

Introduction to Log4shell As we all know that end of the last weekend ie., on Friday, December 10, the entire world came to about the new Zero-day vulnerability in the…

Cyber News Phishing

RTF Template injection technique adopted by APT actors

Dec 21, 2021 Michael

In the recent reports, it is stated that major countries like Russia, India & China have adopted a new technique called “RTF Template Injection” which has made a major change…

Breaches Cyber News Malwares

Kronos Ransomware attack on HR and Payroll team

Dec 18, 2021 Michael

Kronos malware was first discovered around June 2014, by a Russian Security researcher named VinnyK written malware scripts in Russian language and later translated into English. Twitter: https://twitter.com/x0rz/status/893191612662153216   Kronos…

Posts navigation

1 2 … 6
Recent Posts
  • Microsoft Exchange server exploited by Squirrelwaffle malware
  • Apple’s IOS with critical Zero-day Webkit Vulnerability 
  • The Underrated 5Cs of Cyber Security You Need to Know  
  • The Incredible Cyber Kill Chain model we Can’t Live Without
  • The Ultimate Indian Army Faces Trojan Attacks from Android Malware
Archives
  • February 2022
  • January 2022
  • December 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • January 2021
Categories
  • Breaches
  • Cyber News
  • Cyber Security
  • Malwares
  • Phishing
  • Privacy
  • Threat Hunting
  • Threats
  • Vulnerabilities
Recent
  • Microsoft Exchange server exploited by Squirrelwaffle malware
  • Apple’s IOS with critical Zero-day Webkit Vulnerability 
  • The Underrated 5Cs of Cyber Security You Need to Know  
  • The Incredible Cyber Kill Chain model we Can’t Live Without
  • The Ultimate Indian Army Faces Trojan Attacks from Android Malware
  • The Devastating Environmental Impact of DHS Hacked by Suspected Russian Hackers
  • 2022 first ransomware attack hit Schedulefly
  • Log4J vulnerabilities explained easy
  • RTF Template injection technique adopted by APT actors
  • Kronos Ransomware attack on HR and Payroll team
Tags
Advanced Persistent Threat Android Antivirus Antivirus vs Firewall APT APT 29 APT 34 APT 38 Breach Cyber terrorist darkweb Dark Web Evasion Firewall Google chrome Hypothesis incident response India Indian Insider Threats Lateral Movement Malware Microsoft Military Nation-state actors OSI Model Explained easy OSI Model in Simple terms Phishing Privacy Ransomware Russian Hackers Security Smishing Social Engineering Spyware state trojan TCP and UDP Threat actors Threat hunting threat intelligence Trojan Vulnerabilities WFH employees Windows Zero-day
Recent Posts
  • Microsoft Exchange server exploited by Squirrelwaffle malware
  • Apple’s IOS with critical Zero-day Webkit Vulnerability 
  • The Underrated 5Cs of Cyber Security You Need to Know  
  • The Incredible Cyber Kill Chain model we Can’t Live Without
  • The Ultimate Indian Army Faces Trojan Attacks from Android Malware

You missed

Breaches Cyber News Vulnerabilities

Microsoft Exchange server exploited by Squirrelwaffle malware

Feb 16, 2022 Michael
Cyber News Vulnerabilities

Apple’s IOS with critical Zero-day Webkit Vulnerability 

Feb 11, 2022 Michael
Cyber Security

The Underrated 5Cs of Cyber Security You Need to Know  

Feb 4, 2022 Michael
Cyber Security

The Incredible Cyber Kill Chain model we Can’t Live Without

Feb 2, 2022 Michael

Info Haunt

Hunt the Haunt

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Privacy Policy
  • Terms and Conditions
  • Contact