Redline and Vidar Stealers Switch to Ransomware Delivery

In addition to spreading stealer malware, hackers started to deploy ransomware through the same channels

Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same spreading techniques as they used to deliver their spyware. Meanwhile, the process of ransomware enrollment is rather unusual and is full of advanced evasion techniques. What are Redline and Vidar Stealers? RedLine is an infostealer… Continue reading Redline and Vidar Stealers Switch to Ransomware Delivery

TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams

Might today difficult to distinguish between the crypto shill Elon Musk and the actual scams

Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scams videos spread across the platform. Mostly, these scams are masquerading as topics related to Elon Musk, Tesla, or SpaceX. The potential for quick and easy cryptocurrency makes these a constant and disturbing threat. TikTok flooded by “Elon Musk cryptocurrency giveaway” scams. Today, the… Continue reading TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams

GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner

As a part of the GridinSoft team, I am proud to announce the public release of our own online virus scanner service! Now, you can scan the file and see all the information about it for free, by using GridinSoft Online Virus Checker. Let’s check out its key features and find out why it is… Continue reading GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner

What is Whaling Phishing and How To Recognize and Avoid It?

Whaling is a phishing that aims high-profile people in different companies and organizations.

Malicious actors know executives and high-level employees, such as public spokespersons, are familiar with common spam tactics. Due to their public profiles, they may have undergone extensive security awareness training, and the security team may have implemented stricter policies and more advanced tools to safeguard them. As a result, attackers targeting these individuals are forced… Continue reading What is Whaling Phishing and How To Recognize and Avoid It?

3AM Ransomware Backs Up LockBit In Cyberattacks

LockBit cybercrime group introduced the backup malware for their cyberattacks

Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers attempted to use it as an alternative attack method during the failed LockBit deployment. 3AM Ransomware – The Fallback Variant of LockBit According to a recent report, cybersecurity experts have discovered a new type of ransomware known as 3AM. Since this ransomware has… Continue reading 3AM Ransomware Backs Up LockBit In Cyberattacks

What Is Identity Theft & How to Protect Against It

Identity theft is a cybercrime where an individual's personal information is stolen and used by someone else for fraudulent purposes.

Identity theft is a significant issue affecting millions yearly, whether through stolen credit card information or fraudulent accounts. It’s a lucrative business for criminals, who can steal billions of dollars annually through these methods. Unfortunately, data breaches are a common occurrence, and they contribute to the problem. While it’s impossible to prevent data breaches, there… Continue reading What Is Identity Theft & How to Protect Against It

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Using specifically crafted WebP images, hackers can initiate CVE-2023-4863 vulnerability exploitation

Google released an urgent security update for its Chrome browser. The patch contains the fix for CVE-2023-4863, a heap buffer overflow vulnerability that can simply be exploited. Actually, Google states that this vulnerability has already been used in the wild. The breach affects browser builds for all supported OS – Mac, Linux and Windows. Google… Continue reading Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Spyware in Fake Telegram Apps Infected Over 10 million Users

Downloading fake Telegram apps can result in the loss of sensitive data

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions of Telegram on the Google Play Store. This malware designed to extract sensitive information from compromised Android devices. Despite these risks, many users still blindly trust any app verified and published on Google Play. We… Continue reading Spyware in Fake Telegram Apps Infected Over 10 million Users

Mirai variant “Pandora” infects Android TV for DDoS attacks.

New Mirai malware botnet targets low-cost Android TV set-top boxes for powerful DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively used for media streaming by millions of people. The present Trojan is a fresh edition of the ‘Pandora’ backdoor initially identified in 2015, per the analytics. The campaign targets low-cost Android TV boxes such as… Continue reading Mirai variant “Pandora” infects Android TV for DDoS attacks.

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

W3LL started with a mass emailing tool and now has a comprehensive phishing attack kit.

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable assets. One such threat that has recently garnered significant attention is “W3LL.” Next, we will tell you what it is, what it is known for, and how it succeeded in its business over 6 years… Continue reading W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit