Unmasking Strongprotect.co.in: A Deceptive Browser Hijacker
Strongprotect.co.in is a malicious website that employs deceptive tactics to trick users into allowing push notifications, ultimately subjecting them to…
The newest variant in the Stupid ransomware family, Try2Cry, worms its way on to computers using USB Drives
A ransomware called Try2Cry is penetrating Windows computers via USB flash drives and using Windows shortcuts to pose as the…
Netwalker Ransomware takes on a research institution working on a Coronavirus Cure
A top medical research institution working on a cure for the Coronavirus paid hackers a $1.14m ransom after negotiations witnessed…
Ragnar Locker ransomware targets the Remote Management Software used by Managed Service Providers
Ragnar Locker targets software commonly used by managed service providers to prevent their attack from being detected. Hackers were first…
IcedID banking trojan tricks users with COVID-19 & FMLA (Family and Medical Leave Act) phishing emails
Back in 2020, hackers attempted to capitalize on the Coronavirus (COVID-19) pandemic by using phishing campaigns. According to Juniper Networks'…
Java-based malware STRRAT steals credentials & comes with .CRIMSON ransomware module
According to reports, a malware strain known as STRRAT malware is being deployed as part of the infamous .CRIMSON ransomware. …
BlackRock Android malware can steal passwords and credit card data from hundreds of apps
In July of 2020, cybersecurity researchers discovered a strain of banking malware that targets not only banking apps but also…
Past Infections like GandCrab and More Recent REvil/Sodinokibi Ransomware Are a Dangerous Threat
Brief History of GandCrab Criminal Case In August of 2020, a distributor of the infamous GandCrab ransomware was arrested in Belarus on charges…
Beware of the DarkSide! The Early History of the Prolific Ransomware Gang
In 2020, from the shadows of the "Dark Web" a new ransomware operation named DarkSide was born. This outfit began…
What is Crypto-Jacking?
Crypto-jacking, also known as Browser-based cryptocurrency mining, has made a surprising comeback in 2020. According to Symantec's Threat Landscape Trends…
The Ransom X Ransomware that Started in Texas Goes Global
A ransomware called Ransom X or RansomExx in related to human-operated attacks against government agencies and other enterprises. The 2020…
Data Leak Websites and Major Ransomware Groups
In 2020, from the shadows of the "Dark Web" a new ransomware operation named DarkSide was born. This outfit began…
Barousel Trojan: Unveiling the Deceptive Threat – Characteristics, Risks, and Removal
Barousel, the digital Trojan horse of the modern era, exemplifies the art of deception in the realm of cybersecurity. Like…
ChaChi RAT: An Emerging Threat – Characteristics, Risks, and Removal
ChaChi is a rapidly evolving Remote Access Trojan (RAT) that poses a significant threat in the realm of cybersecurity. This…
Adblock Ultimate: Unwanted Browser Hijacker – Threats, Removal, and Prevention
Adblock Ultimate is a persistent nuisance that can infiltrate your web browser, wreaking havoc on your online experience. This browser…
Total Adblock: Unwanted Browser Hijacker – Threats, Removal, and Prevention
Total Adblock is a browser hijacker notorious for its stealthy infiltration methods and aggressive behavior once inside a system. This…
CygnusOlor Malicious Extension: A Comprehensive Overview, Threats, Removal, and Prevention
CygnusOlor is a malicious browser extension that primarily targets Google Chrome and Microsoft Edge users. This extension poses a significant…
Phobos Ransomware: the encryption ransomware threat that came from the Dharma and Crysis ransomware families
Phobos Ransomware is an encryption ransomware threat that was first observed on October 21, 2017. While Phobos ransomware technically emerged…
Maryland’s efforts to criminalize the mere possession of malware
Well, we all realize the havoc that malware can wreak on unsuspecting victims, but what is the government doing to…
Sodinokibi Ransomware: a ransomware-as-a-service
Ransomware strains increase and decrease in popularity, but one type whose usage has been growing in frequency is the infamous…
ZShlayer: New Mac Malware Heavily Obfuscates Zsh Scripts to Bypass Security Tools
Researchers have recently discovered a new macOS malware variant dubbed ZShlayer which can mask itself to sneak past security tools…
Zeppelin Ransomware Makes a Comeback Using New Trojan to Avoid Detection
After a six-month shelving, Zeppelin ransomware has returned in late August of 2020, according to researchers at Juniper Threats Labs.…
Quarter 2 of 2020 Sees a Staggering 143 Million Malware Attacks
2020 has been a year like no other we've experienced. The year started normally for most of us, but a…
Android Apps are Under Alien Attack! Alien Malware Steals Passwords from Over 200 Apps
According to reports, researchers have discovered a new strain of Android-specific malware that comes with an array of features that…
New Mount Locker Ransomware Seeks Big Game and Million Dollar Payouts
A new ransomware named Mount Locker steals victims' files before encrypting and then demanding multi-million dollar ransoms. This recent crime…
LokiBot Ransomware is on the Rise, Stealing Passwords & Cryptocurrency Wallets
Federal and state law enforcement officials have observed a big uptick in LokiBot Ransomware infections, an open-source do-it-yourself malware package…
‘SilentFade’ Malware Stole Credentials & $4 Million from Facebook Users
In the fall of 2020, Facebook detailed a rare cybercrime campaign out of China that wasn't focused on disinformation or…
Paying Ransoms to Ransomware Gangs Might Lead Companies to Big Federal Fines
The United States' Treasury Department's Office of Foreign Assets Control (OFAC) issued an advisory in October of 2020 that states that…
MalLocker Android Ransomware Locks Your Screen Upon Pressing the Home Button
In October of 2020, the Microsoft 365 Defender Research Team discovered a piece of sophisticated Android ransomware that utilized new…
GravityRAT Windows Malware Branches Out to Infect macOS and Android
In the evolution of online threats, it is now possible for an infection to originate on one platform before migrating…
Vizom Malware Masquerades as a Video Conferencing App to Fool Victims & Access Their Bank Accounts
2020 will always be remembered as the year where video conferencing hit the mainstream, as a response to the coronavirus…
US Sanctions Russian Government Center Linked to the Highly Destructive Triton Malware
In October of 2020, the US Treasury Department announced new sanctions against a Russian research institute alleged to have been…
Search Center Adware: Unmasking the Intrusive Threat and Safeguarding Your Digital Space
In the vast digital landscape, threats to your online privacy and system security often come in the form of seemingly…
Battling Tab Clear Adware: What It Is, How It Infects, and How to Remove It
In the digital age, we often download browser extensions and software to enhance our web browsing experience. However, not all…
Understanding Bulk Orders and How to Protect Yourself from Email Scams
In today's digital age, email scams have become an increasingly prevalent threat to individuals and organizations. One such scheme that…
The ITQW Varian of the STOP/Djvu Ransomware Group. How to deal it and Best Ways to Protect Your System
ITQW Ransomware Joins the STOP/Djvu Ransomware Family What is Ransomware? Ransomware is a malicious form of malware that encrypts a…
RegretLocker Ransomware Uses Advanced Techniques to Encrypt Windows Virtual Machines
A new ransomware called RegretLocker was discovered in late 2020. RegretLocker employs various advanced features that allow it to encrypt…
Fake COVID-19 Test Results Phishing Email Spreads King Engine Ransomware
A variant of Hentai OniChan Ransomware known as "King Engine" ransomware is being delivered to victims in a Coronavirus-themed phishing…
FBI & Other Agencies Warn US Hospitals of Imminent Ransomware Attacks
In late 2020, the FBI, the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), and the Department of…
Pay2Key Ransomware Spreads & Encrypts Networks Within Just One Hour
A ransomware called Pay2Key is targeting Israeli and Brazilian organizations and encrypting their networks within one hour. According to cybersecurity…
Beverage Maker Campari & Gaming Giant Capcom Suffer the Effects of RagnarLocker Ransomware
Hackers using Ragnar Locker ransomware pulled off some of the more brazen attacks against high profile targets in recent memory.…
Ransomware Gangs Use Fake Microsoft Teams Updates to Deploy Cobalt Strike & Infect Networks with Malware
Hackers have begun to use fake ads for Microsoft Teams updates to infect computers with backdoor entry points using Cobalt…
How to Find & Remove Adware, Malware & Viruses from an Android Phone?
People usually associate malware with desktop computers. However, Android phones are just as susceptible to malware attacks as your home…
Agent Tesla RAT Uses Extensive Password-Stealing Tricks to Stay on Top
Remote Access Trojans are surging in recent years and have become more common than even some of the world's most…
Is Your Browser Constantly Being Redirected to Yahoo Search (Search.yahoo.com)?
If your default homepage and search engine of your web browsers were changed without your knowledge or permission and your…
Ragnar Locker Ransomware Gang Uses Facebook Ads to Publicly Remind Their Victims to Pay Up
The Ragnar Locker ransomware gang has taken to posting ads on Facebook to publicly shame victims into paying ransoms. Security…
The Dangers of Lockbit Ransomware Decoded
The LockBit ransomware gang is using several different automation tools and techniques to enable the crypto-locking malware to quickly spread through compromised networks and…
Has Your Browser Been Hijacked & Redirecting to Searchlee.com?
If your web browser's home page has unexpectedly changed to a search page you've never heard of, or if you…
The Hackers Behind Avaddon Ransomware React to a Recently Released Free Decryptor
Hackers love to take advantage of unsuspecting victims. That feeling of control is thought to be part of the rush…
An Array of Mac Threats Trigger macOS to Display “… Will Damage Your Computer” Pop-Up Alerts
Are you attempting to launch an app or just using your Mac brings up an alarming pop-up message? Is the…