Malicious Threat
HTML misused in a malicious manner
- 12 May 2023
- Jonathan Aquilina - Eagle Eye T
- Cybersecurity
HTML, or Hyper Text Markup Language, has been misused by malicious threat actors for years. In a report published by Barracuda, it was observed that roughly 21% of the HTML…
Read moreThreat Advisory – EvilExtractor Malware Spikes In Europe and US
- 03 May 2023
- Jonathan Aquilina - Eagle Eye T
- Cybersecurity
Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…
Read moreRecent Posts
- Unlocking Visual Intelligence: How Vision Processing Units are Transforming Technology
- Smart Horizons: Unpacking the IoT and Smart Device Trends Shaping 2024
- Sparks of Concern: Examining the NVIDIA RTX 5090 Power Connector Crisis
- Cracking the Code: Unveiling the Hidden Flaws of Nvidia RTX 5000 Series GPUs
- Why Manufacturers Need a Unified Data Strategy for Digital Success
Recent Comments
- Jonathan Aquilina - Eagle Eye T on Sparks of Concern: Examining the NVIDIA RTX 5090 Power Connector Crisis
- Suno API on Sparks of Concern: Examining the NVIDIA RTX 5090 Power Connector Crisis
- Jonathan Aquilina - Eagle Eye T on AI Workloads Get A Boost From New Chip Designs
- Ash on AI Workloads Get A Boost From New Chip Designs
Categories
- Agentic AI
- AI Regulations
- Alerts
- AMD
- Android
- App Store
- Application Security
- Artificial Intelligence (AI)
- Automation
- Breach
- Business Continuity
- Certificates
- Cloud
- Compliance
- Containers
- CPU Architecture
- CPU Performance
- Cron
- Crypto Exchange
- Cyber Attack
- Cyber Awareness Month
- Cyber Insurance
- Cybersecurity
- Cyberwarfare
- Data Management
- Data Privacy
- Data Protection
- Data Residency
- Data Sovereignty
- Data Strategy
- Decentralized Social Media
- Deep Fakes
- Development
- DKIM
- DMARC
- E-Signatures
- Email Deliverability
- Email Encryption
- Ethics
- FAQ
- Glossary
- Hardware
- How To
- Hyperautomation
- Incident Response
- Infrastructure
- Innovation
- Instant Messaging
- Integrations
- Intelligent
- IT News
- Kali
- Kubernetes
- Licensing
- Linux
- LLM
- Machine Learning (ML)
- Malware
- Managed Service Provider (MSP)
- Medical
- Microsoft Windows
- Multi Factor Authentication (2FA)
- Open Source Software
- Operating Systems
- Opinion
- Optimization
- Phishing
- Phishing as a Service (PaaS)
- Phone
- Plugins
- Podcast
- Poll
- Private Cloud
- QR Codes
- Quantum Computing
- Ransomware
- Reviews
- Risk
- Risk Assessment
- Robotic Process Automation
- Rust
- SaaS
- Seasons Greetings
- SEO
- Shared Responsibility
- Social Engineering
- Social Media
- Software Testing
- SPF
- Statistics
- Statistics
- Statistics
- Subject Lines
- Supply Chain Attack
- Sustainability
- System Integrations
- Technology
- Technology Trends
- Telecommunications
- Top 10
- Transformation
- Tutorial
- Uncategorized
- Vishing
- Vision Processing Units (VPU)
- Vulnerability
- Webinar
- Windows Patch Tuesday
- Wordpress
- Zero Trust