Understanding and Avoiding Rogue Websites Like Dragonorders.com
The internet is filled with various websites offering a wide range of content and services. While most websites are legitimate…
Understanding CVE-2023-34048: A Critical VMware vCenter Server Vulnerability
CVE-2023-34048 is a critical vulnerability discovered in VMware's vCenter Server, a vital component of virtualization infrastructure. In this article, we…
Sarwent Malware: Unmasking the Threat
A new version of Sarwent malware can open Remote Desktop Protocol ports, giving hackers hands-on access to victims' computer When…
Covid-19 Themed Malware and Ransomware Threats
As the hysteria related to the Coronavirus pandemic begins to wind down, so does the prevalence of overall COVID-19-themed malware…
“Mass Logger” sets the new standard in the realm of key logging threats
"Mass Logger," which is one of the newest keyloggers currently making the rounds in the cybersphere, is being tracked by…
BlazeStealer Malware: Unmasking the Threat, Removal, and Prevention
BlazeStealer is a malicious program designed to steal sensitive data from devices. It poses a significant threat to your online…
Maryland’s efforts to criminalize the mere possession of malware
Well, we all realize the havoc that malware can wreak on unsuspecting victims, but what is the government doing to…
Quarter 2 of 2020 Sees a Staggering 143 Million Malware Attacks
2020 has been a year like no other we've experienced. The year started normally for most of us, but a…
‘SilentFade’ Malware Stole Credentials & $4 Million from Facebook Users
In the fall of 2020, Facebook detailed a rare cybercrime campaign out of China that wasn't focused on disinformation or…
GravityRAT Windows Malware Branches Out to Infect macOS and Android
In the evolution of online threats, it is now possible for an infection to originate on one platform before migrating…
Vizom Malware Masquerades as a Video Conferencing App to Fool Victims & Access Their Bank Accounts
2020 will always be remembered as the year where video conferencing hit the mainstream, as a response to the coronavirus…
US Sanctions Russian Government Center Linked to the Highly Destructive Triton Malware
In October of 2020, the US Treasury Department announced new sanctions against a Russian research institute alleged to have been…
Ransomware Gangs Use Fake Microsoft Teams Updates to Deploy Cobalt Strike & Infect Networks with Malware
Hackers have begun to use fake ads for Microsoft Teams updates to infect computers with backdoor entry points using Cobalt…
Segurazo Antivirus Leads Users Into Thinking It Has Useful Features
The Segurazo Antivirus, or SAntivirus, purports to be a helpful and legitimate antivirus tool, but in reality, Segurazo Antivirus bombards…
CopperStealer Malware Targets the Log-in Credentials of Amazon, Google, Apple & other Popular Services
A recent outbreak of CopperStealer malware, which is also referred to as Mingloa, has been observed stealing sensitive and personal…
Anti-Malware Lab, a Rogue Anti-Malware Program That Runs a Fake System Scan to Intimidate Windows Users
Anti-Malware Lab, a Rogue Anti-Malware Program That Runs a Fake System Scan to Intimidate Windows Users Have you been getting…
Unmasking BLOODALCHEMY Malware: A Deep Dive into its Structure and Defenses
The Hidden Threat of BLOODALCHEMY Malware In the ever-evolving world of cybersecurity, new threats emerge continuously, and the BLOODALCHEMY malware…
ExtensionInstallForcelist: Best Practices when Dealing with Google Chrome
Browser Hijackers & Other Threats Could Take Advantage of the 'ExtensionInstallForcelist' Chrome Policy to Make Their Removal Problematic 'ExtensionInstallForcelist' Chrome…
What are the Best Ways to Rid Your Browser from Fake Search Results Caused by ‘Windows Anti-Malware Patch’?
Windows Anti-Malware Patch is a Rogue Anti-Malware Program that Falsifies Scan Results. Windows Anti-Malware Patch is a rogue antivirus program…
Malicious Repercussions to Visiting Adult Video Websites
Visiting Porn Sites May Put Your Computer at Risk of a Malware Infection Malware is one of the biggest threats…
FoggyWeb Malware is Associated with the Advanced Persistent Threat Group NOBELIUM
FoggyWeb Malware, associated with the Advanced Persistent Threat group NOBELIUM, is yet another threatening addition to the group's malware arsenal.…
Outdated Security Solution RAV Antivirus is Spreading Through Bundled Downloads
RAV Antivirus is an antiquated security solution developed and published by GeCAD Software. RAV Antivirus would later catch the attention…
RedLine Stealer malware is designed to steal data from PC users
RedLine Stealer is a multi-faceted malware capable of extracting a victim's information from FTP servers, web browsers, instant messaging clients,…
Gamaredon Group is an APT That Targets Victims in Ukraine
Advanced persistent threat (or APT) groups have really come of age in the past several years, as cybercrime syndicates increasingly…
Leftover CLSID Registry Keys are a Common PC Issue Due to Improper Uninstallation of Apps
CLSID, also known as Class Identifier, is a string of alphanumeric symbols used to represent a specific instance of a…
Crypto-Mining Trojans May Masquerade as the Legitimate ‘AggregatorHost.exe’ Process
There have been reports by Windows users about the AggregatorHost.exe process running quietly in the background of their systems. While…
Malware May Masquerade as the Legitimate ‘msedge.exe’ Windows Process
If you are a Windows user, you may notice that there is a 'msedge.exe' process running in the background of…
The Legitimate “UnrealCEFSubProcess” is Often Impersonated By Malware
In the neverending online game between hackers and potential victims, new methods of hiding malicious code always seem to be…
An Illegitimate Version of the rsEngineSvc Process May Mean You Are Infected with a Cryptominer
If you are a Windows user, you may have noticed an unfamiliar rsEngineSvc process running in the background of your…
Protect your PC from Dybdended.com
Dybdended.com Displays the Fake Error ‘Your Windows 10 is infected with viruses’ Cybersecurity researchers have been alerted to another threat:…
The Dangerous Botnet Associated with Oneetx.exe
The Oneetx.exe File is Associated with a Dangerous Botnet Oneetx.exe is a file that is associated with a dangerous botnet…

