Novalock Ransomware
Novalock is a sophisticated form of malware designed to encrypt your files…
BeyondTrust Remote Access Vulnerability Exploited, Update Now
BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two…
Locklocklock Ransomware
Locklocklock is a ransomware virus designed to lock your files and demand…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often…
New Ledger Phishing Campaign Targets Recovery Phrases
Owners of popular hardware cryptocurrency wallets Ledger have become the target of…
SUPERLOCK Ransomware Virus Simple Step-by-Step Removal Guide
SUPERLOCK is a ransomware infection that aims at blocking access to the…
Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware
Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo's file transfer software…
Brad Garlinghouse Crypto Giveaway Scam Explained
Brad Garlinghouse Crypto Giveaway is a scam campaign that masquerades as a…
Shougnoboassi.net Redirect Virus
Shougnoboassi.net is a website that you may notice appearing in your web…
Aiocpa PyPI Package Targets Crypto Wallets
A malicious package named aiocpa was identified on the Python Package Index…
Top 3 MMS Scams: What Threats Can Messages Bring
MMS is a rather old technology that is being pushed out of…
Ivanti Fixes Authentication Bypass Vulnerability, Patch Now
Ivanti has alerted its customers to a critical authentication bypass vulnerability in…