Malicious
HTML misused in a malicious manner
- 12 May 2023
- Jonathan Aquilina - Eagle Eye T
- Cybersecurity
HTML, or Hyper Text Markup Language, has been misused by malicious threat actors for years. In a report published by Barracuda, it was observed that roughly 21% of the HTML…
Read moreThreat Advisory – EvilExtractor Malware Spikes In Europe and US
- 03 May 2023
- Jonathan Aquilina - Eagle Eye T
- Cybersecurity
Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…
Read moreRecent Posts
- What OpenAI’s New Threat Report Means for Business Cybersecurity in 2025
- What to Know About a Vulnerability Being Exploited on Microsoft SharePoint Servers
- iOS 26 Public Beta: Liquid Glass and Exciting Features Coming to Your iPhone
- The EU AI Act: Europe’s Bold Move to Regulate Artificial Intelligence
- Iran’s Internet Blackout: How Do Countries Shut Down the Web and What Are the Impacts?
Recent Comments
- OpenAI Threat Report for Businesses: Key Insights - Eagle Eye Technology on iOS 26 Public Beta: Liquid Glass and Exciting Features Coming to Your iPhone
- Microsoft SharePoint Vulnerability: What You Need to Know - Eagle Eye Technology on iOS 26 Public Beta: Liquid Glass and Exciting Features Coming to Your iPhone
- iOS 26 Public Beta: What's New for iPhone - Eagle Eye Technology on The EU AI Act: Europe’s Bold Move to Regulate Artificial Intelligence
- EU AI Act: A Comprehensive Guide to Regulation - Eagle Eye Technology on Iran’s Internet Blackout: How Do Countries Shut Down the Web and What Are the Impacts?
- Internet Blackout in Iran: Impacts and Consequences - Eagle Eye Technology on US Judge Rules: Copyrighted Books Can Be Used to Train AI Models—What It Means for the Future
Categories
- 3D Printing
- Agentic AI
- AI Regulations
- Alerts
- AMD
- Android
- Android
- App Store
- Apple
- Application Security
- Artificial Intelligence (AI)
- Automation
- Banking
- Blast From The Past
- Breach
- Business Continuity
- Car Play
- Car Play
- Censorship
- Certificate Lifecycle
- Certificates
- Certificates
- Cloud
- Cloud Storage
- CMS
- Cognitive Dissonance
- Compliance
- Containers
- Content Management
- CPU Architecture
- CPU Performance
- Cron
- Crypto Exchange
- Cryptography
- Cyber Attack
- Cyber Awareness Month
- Cyber Espionage
- Cyber Insurance
- Cybersecurity
- Cyberwarfare
- Dark Web
- Data Annotation
- Data Loss
- Data Management
- Data Privacy
- Data Protection
- Data Residency
- Data Sovereignty
- Data Strategy
- Decentralized Social Media
- Deep Fakes
- Development
- Digital Transformation
- DKIM
- DMARC
- DNS
- Driver Security
- E-Signatures
- EagleEyeT News
- Ecommerce
- Email Deliverability
- Email Encryption
- Email Security
- Emerging Threats
- Encryption Ciphers
- Ethics
- FAQ
- File Systems
- Fraud
- Glossary
- GUID
- Hardware
- How To
- Hyperautomation
- Identity Management
- Incident Response
- Infrastructure
- Innovation
- Instant Messaging
- Integrations
- Intelligent
- Internet
- Internet Backbone
- iOS
- IT News
- Kali
- Kubernetes
- Kubernetes
- Licensing
- Linux
- LLM
- Machine Learning (ML)
- Malware
- Managed Service Provider (MSP)
- MDM
- Medical
- Microsoft Intune
- Microsoft OneDrive
- Microsoft Sharepoint
- Microsoft Windows
- Microsoft's Patch Tuesday
- Mobile Devices
- Multi Factor Authentication (2FA)
- Netflix
- NIST
- Open Source Software
- Operating Systems
- Opinion
- Opnsense
- Optimization
- Parental Control
- Phishing
- Phishing as a Service (PaaS)
- Phone
- Plugins
- Podcast
- Poll
- Private Cloud
- Proxy Services
- QR Codes
- Quantum Computing
- Random Musings
- Ransomware
- Reviews
- Risk
- Risk Assessment
- Risks
- Robotic Process Automation
- Robotics
- Rust
- SaaS
- SCIM
- Seasons Greetings
- SELinux (Security Enhanced Linux)
- Sending Email
- SEO
- Shared Responsibility
- Social Engineering
- Social Media
- Software Testing
- SPF
- Statistics
- Statistics
- Statistics
- Sticky Bits
- Streaming
- Subject Lines
- SUID
- Supply Chain Attack
- Sustainability
- System Integrations
- Technology
- Technology Trends
- Telecommunications
- Top 10
- Transformation
- Tutorial
- Typography
- Uncategorized
- Vishing
- Vision Processing Units (VPU)
- Vulnerability
- Webinar
- Windows Patch Tuesday
- Wordpress
- Wordpress News
- Zero Day
- Zero Trust