Threat actors have been seen to abuse Windows zero-day which allows malicious JavaScript Files to bypass Mark-of-the-Web security warnings. Mark-of-the-Web [...]
According to security researchers, hackers are still exploiting the critical VMware vulnerability (CVE-2022-22954) that allows them to drop various malware [...]
The latest Firefox version brought a new feature that allows the convenient editing of PDF files. The feature allows users [...]
The threat actor is supposedly selling a brand new UEFI bootKit named BlackLotus on hacking forums, which is commonly linked [...]
Ducktail phishing campaign, linked to Vietnamese hackers, is actively stealing Facebook accounts, cryptocurrency wallets, and browser data using new PHP [...]
The Dutch National Police, in collaboration with cybersecurity firm Responders.NU got 155 decryption keys from the DeadBolt ransomware gang by [...]
An unofficial Android version of WhatsApp called 'YoWhatsApp' has been discovered to steal access keys for users' accounts. YoWhatsApp has [...]
How to cut off HEADCAPTCHA.LIVE virus (Removal Guide)
According to security researchers, IcedID creators have been improving and diversifying the delivery tactics of their phishing campaigns. IcedID is [...]
Last Friday an anonymous Twitter account by the nickname 'freak' posted links that led to Intel's 12th generation processor (known [...]
How to eliminate NOTOMICA.COM virus (Removal Guide)
How to remove AGENCEBEABLE2.COM virus (Removal Guide)
Microsoft has confirmed a known issue that causes performance reduction when copying large files over SMB after installing the Windows [...]
Eternity Project is a marketplace where threat actors can buy various malicious software for their own use, including miners, stealers, [...]
According to security researchers, a large number of Microsoft SQL servers are currently targeted by the new backdoor called Maggie. [...]
How to eliminate HIGHTCHECK.COM virus (Removal Guide)
How to uninstall THREECAPTCHA.TOP virus (Removal Guide)
Threat actors have been abusing two Microsoft Exchange zero-days in order to breach its servers and remotely execute the malicious [...]
Windows uses File Explorer to work with files, but its functionality is limited, for example, it doesn't allow users to [...]
North Korean hacking group Lazarus has been using a Windows rootkit called FudModule to abuse a Dell driver vulnerability in [...]
According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
How to clear away SAFERURL.NET virus (Removal Guide)
How to clear away HOMEPAGE-CO.COM virus (Removal Guide)
How to get rid of DSC.SEARCHLIGHTPRO.COM virus (Removal Guide)
How to erase COOLWEBSEARCH.INFO virus (Removal Guide)
A new malware dropper NullMixer has been discovered to infect Windows devices with a large variety of malware families, including [...]
Security researchers have found 75 adware apps on Google Play and 10 on Apple's App Store, adding to 13 million [...]
One of the new features coming with Windows 11 22H2 is a security feature called Enhanced Phishing Protection. The feature's [...]
Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
How to clear away SEARCH-TAP.COM virus (Removal Guide)
How to get rid of DAILYGUIDES.COM virus (Removal Guide)
According to VMware and Microsoft, an ongoing widespread Chromeloader malware campaign was seen to drop malicious browser extensions and even [...]
GTA 6 source code and gameplay videos have been leaked to GTAForums by the threat actor ‘teapotuberhacker’. The RAR archive [...]
Romanian cybersecurity company Bitdefender has released a free decryptor for LockerGoga ransomware that victims can use to decrypt their files [...]
How to get rid of MAINCAPTCHA.TOP virus (Removal Guide)
The new security advisory has been issued by Apple on Monday in which the company addressed the eighth zero-day vulnerability [...]
More and more ransomware gangs are employing the new tactic called intermittent encryption which allows faster encryption and fewer chances [...]
According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
The operation CodeRAT originates from Iran and mostly targets Farsi-speaking software devs with Word documents that include a DDE exploit. [...]