News, Tips, Security Lab

Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

According to cybersecurity specialists from Cyble, attackers distribute miners and the RedLine infostealer using download sites for the fake MSI…

Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency

A Windows malware designed to steal cryptocurrency and clipboard contents installs a malicious VenomSoftX Chrome extension on users’ machines. The…

Apple ID Scams: Identify and Prevent Apple Phishing Email

Apple users are believed to be protected from all sorts of fraud and hacking. That’s because Apple designs its technologies…

Black Friday Scams Alert: Worst Black Friday Shopping Scams

Black Friday is almost here, and many of us are ready to run to empty the store shelves. Black Friday…

Exploit for Vulnerabilities ProxyNotShell Appeared on the Network

Experts warned that an exploit for two high-profile vulnerabilities in Microsoft Exchange, which are collectively called ProxyNotShell, has appeared in…

Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years

Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years

Since 2020, some information security specialists have helped victims, as individuals and companies affected by the Zeppelin ransomware. The fact is that a number of vulnerabilities were found in the…

Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years

Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years

Security professionals at Unit221b found vulnerabilities in the Zeppelin ransomware encryption mechanism. Experts managed to use them to create a working decryptor that they have been using since 2020 to…

What Is an Evil Twin Attack? How Does It Work?

What Is an Evil Twin Attack? How Does It Work?

How often do we connect to free Wi-Fi networks in public places? Whether to post Instagram stories with a cup of coffee we just bought or to make edits to…

Mirai Botnet RapperBot Conducts DDoS Attacks on Game Servers

Mirai Botnet RapperBot Conducts DDoS Attacks on Game Servers

The researchers warned that the RapperBot Mirai botnet has resumed activity, and now the updated malware is used for DDoS attacks on game servers, although the exact goals of the…

How to Stress Test Your PC’s CPU

How to Stress Test Your PC’s CPU

Stress testing your CPU is the surest way to discover the true limits of your computer’s capabilities. Read on to learn how to stress test your CPU and put your…

PCspoF Attack Could Disable Orion Spacecraft

PCspoF Attack Could Disable Orion Spacecraft

A team of researchers from the University of Michigan, the University of Pennsylvania, and NASA have detailed a TTEthernet (Time-Triggered Ethernet) PCspoF attack that could disable the Orion spacecraft. Experts…

Pretexting in Cyber Security: Facts to Know

Pretexting in Cyber Security: Facts to Know

Pretexting is a type of social engineering in which an attacker gains access to information, a system, or service by deception. In doing so, the attacker provides a false script…

What is eWallet? How to Protect Your eWallet

What is eWallet? How to Protect Your eWallet

During a time of crisis, Americans turned to digital wallets called eWallets to purchase supplies without face-to-face interaction with payment terminals or cards. These wallets make purchasing supplies faster and…

“This Site Can’t Provide a Secure Connection”: How to Fix

“This Site Can’t Provide a Secure Connection”: How to Fix

Every active Internet user has encountered error messages at least once, especially security-related ones. For example, the “This site can’t provide a secure connection” notification can be alarming. However, more…