This Message Seems Dangerous
Sometimes, Gmail displays a "This Message Seems Dangerous" notification alerting the user…
Meduza Stealer
The Malware world evolves constantly, and it would be reckless to ignore…
What is Infostealer Malware? Top 5 Stealers in 2024
The Cybercrime world changes rapidly – both by expanding, collapsing, and evolving…
SearchHost.exe – Is SearchHost a virus?
SearchHost is a process responsible for indexing the Start menu and Explorer…
WinRing0x64.sys
WinRing0x64.sys is a low-level driver that is used by specific applications. The…
How can an attacker execute malware through a script?
Over the last four years, the share of script-based attacks of malware…
Trojan:Win32/Vigorf.A
Trojan:Win32/Vigorf.A is a generic detection of Microsoft Defender. This detection commonly identifies…
Program:Win32/Wacapew.C!ml
Program:Win32/Wacapew.C!ml detection refers to programs that have suspicious properties. This can be…
Lumma Stealer Spreads Via Fake Browser Updates, Uses ClearFake
Recent research uncovered a selection of websites that deploy Lumma Stealer under…
HTTPS vs HTTP
HTTPS and HTTP are constantly around us, but their difference is not…
PUABundler:Win32/CandyOpen (PUA OpenCandy)
PUABundler:Win32/CandyOpen (or OpenCandy) is an unwanted program that acts as a browser…
Trojan:Win32/Cerber
Trojan:Win32/Cerber is a detection name that Microsoft Defender uses to flag ransomware.…