Eternity Project is a marketplace where threat actors can buy various malicious software for their own use, including miners, stealers, [...]
According to security researchers, a large number of Microsoft SQL servers are currently targeted by the new backdoor called Maggie. [...]
How to eliminate HIGHTCHECK.COM virus (Removal Guide)
How to uninstall THREECAPTCHA.TOP virus (Removal Guide)
Threat actors have been abusing two Microsoft Exchange zero-days in order to breach its servers and remotely execute the malicious [...]
Windows uses File Explorer to work with files, but its functionality is limited, for example, it doesn't allow users to [...]
North Korean hacking group Lazarus has been using a Windows rootkit called FudModule to abuse a Dell driver vulnerability in [...]
According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
How to clear away SAFERURL.NET virus (Removal Guide)
How to clear away HOMEPAGE-CO.COM virus (Removal Guide)
How to get rid of DSC.SEARCHLIGHTPRO.COM virus (Removal Guide)
How to erase COOLWEBSEARCH.INFO virus (Removal Guide)
A new malware dropper NullMixer has been discovered to infect Windows devices with a large variety of malware families, including [...]
Security researchers have found 75 adware apps on Google Play and 10 on Apple's App Store, adding to 13 million [...]
One of the new features coming with Windows 11 22H2 is a security feature called Enhanced Phishing Protection. The feature's [...]
Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
How to clear away SEARCH-TAP.COM virus (Removal Guide)
How to get rid of DAILYGUIDES.COM virus (Removal Guide)
According to VMware and Microsoft, an ongoing widespread Chromeloader malware campaign was seen to drop malicious browser extensions and even [...]
GTA 6 source code and gameplay videos have been leaked to GTAForums by the threat actor ‘teapotuberhacker’. The RAR archive [...]
Romanian cybersecurity company Bitdefender has released a free decryptor for LockerGoga ransomware that victims can use to decrypt their files [...]
How to get rid of MAINCAPTCHA.TOP virus (Removal Guide)
The new security advisory has been issued by Apple on Monday in which the company addressed the eighth zero-day vulnerability [...]
More and more ransomware gangs are employing the new tactic called intermittent encryption which allows faster encryption and fewer chances [...]
According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
The operation CodeRAT originates from Iran and mostly targets Farsi-speaking software devs with Word documents that include a DDE exploit. [...]
In the new Chrome version 105.0.5195.102 Google has addressed a high severity vulnerability that was actively exploited in the wild. [...]
According to Chile's national computer security and incident response team (CSIRT) the ransomware attack that started on August 25 has [...]
How to remove FAMOUSSEARCH.COM virus (Removal Guide)
According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]
According to Check Point's report, malware by the developer 'Nitrokod' delays its installation for a month to avoid being detected [...]
Chromium-based web browsers (including Chrome) allow websites to write anything they want into the user's clipboard without getting permission from [...]
New malware dubbed 'MagicWeb' from the Russian state-sponsored hacking group APT29 (also known as Nobelium, Cozy Bear) has been discovered [...]
Password management company LastPass was hacked two weeks ago, allowing hackers to steal source code and technical information. According to [...]
Chrome extension 'Internet Download Manager' has reached 200,000 installs on Chrome Web Store, while sitting on the store since June [...]
How to delete THESEARCH.XYZ virus (Removal Guide)
How to delete ADVERTISINGVT.COM virus (Removal Guide)
Hackers have managed to abuse the zero-day vulnerability in General Bytes Bitcoin ATM servers to steal the cryptocurrency from the [...]
The online tool InAppBrowser created by developer Felix Krause allows users to check if their in-app browsers inject privacy-threatening JavaScript [...]