Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks reports about an exploited ACE flaw, found in their PAN-OS

Palo Alto Networks warns its customers regarding a vulnerability in their PAN-OS, that leads to command injection. Residing in their GlobalProtect feature, and requiring some specific configurations, this flaw still manages to hit the max CVSS score of 10/10. Fixes for the issue are already in development, the company says. PAN-OS Command Injection Vulnerability Exploited… Continue reading Critical PAN-OS Command Injection Flaw Exploited

Fake Robux Generators Spread on Government Websites

Researchers noticed dozens of PDF documents that propagate fake generators of Roblox in-game currency

Huge number of fake Robux generators recently appeared on a range of websites with .gov, .mil, and edu. They commonly pose as PDF files, enriched with keywords that boost their SEO ranking to show up on top of Google search results. By parasiting on legit domains of government, military, and educational organizations, they also avoid… Continue reading Fake Robux Generators Spread on Government Websites

Critical LG TV Vulnerabilities Allow for Command Execution

LG TV users are advised to update the software to the latest version due to the 4 critical security flaws

LG reports fixing four critical vulnerabilities discovered in many of its TVs. These vulnerabilities were found back in 2023, and could allow malicious actors to gain control of affected LG TVs. Good news – the attacker should connect to the same network to exploit the flaw. Bad news – they can continue using the device… Continue reading Critical LG TV Vulnerabilities Allow for Command Execution

List of Scammer Phone Numbers 2024

Take your time calling back if your phone starts ringing and then stops ringing. You may become a victim of a phone scam.

Telephones have long been integral to everyday life, and scammers couldn’t help but take advantage of them. Although making random calls is as old as the world, sometimes the calls come from numbers with all kinds of area codes you may not have even heard of before. As a result, automated phone calls have become… Continue reading List of Scammer Phone Numbers 2024

Stopabit Virus

If you see Stopabit in the Task Manager, your system is at risk

Stopabit is an unwanted application that can steal sensitive data. One of its primary functions involves browser hijacking, enabling it to intercept and collect sensitive input data, focusing on capturing passwords. The most visible sign of its activity is the changed browser search engine and start page and numerous advertisements on websites and in system… Continue reading Stopabit Virus

“Account restrictions are preventing this user from signing in”

Account restrictions or security settings block a user from logging in, requiring access rights to be adjusted.

When working with Windows, users may sometimes encounter the “Account restrictions are preventing this user from signing in” error. This problem can cause significant inconvenience, up to complete inability to use necessary services and applications. In this article, we will discuss in detail what this error is, why it occurs and how to fix it.… Continue reading “Account restrictions are preventing this user from signing in”

SMApps Virus

SMApps is a pretty nasty thing. You should get rid of it as soon as possible.

SMApps is a malicious program that aims at spreading illegal promotions. It mainly attacks browsers by changing settings and redirecting search queries from Google to suspicious sites. Possible distribution methods are standard: malicious adverts and dodgy sites with hacked software. This malware uses different detection evasion, anti-analysis, and persistence tactics. Although primarily positioned as adware,… Continue reading SMApps Virus

Hunt Ransomware ([email protected])

Hunt ransomware is a novice malware sample, detected on April 5, 2024

Hunt ransomware is a new sample of the Dharma/CrySis ransomware family that appeared on April 5, 2024. This malware aims at encrypting the files and asking a ransom payment for their decryption. It unselectively targets both home users and corporations, correcting the ransom depending on the target. Jakub Kroustek was the first to discover this… Continue reading Hunt Ransomware ([email protected])

Two Android Zero-Day Flaws in Google Pixel Exploited

Google Pixel smartphone owners are advised to update their devices to the latest version as soon as possible.

Google has disclosed that two Android zero-day security vulnerabilities have been detected in its Pixel smartphones. The patch is already available, as Google claimed fixing the flaws in the recent Pixel Update Bulletin. Even worse news is that the flaw is already under exploitation in targeted attacks. Two Android Zero-Day Flaws Exploited in Targeted Attacks… Continue reading Two Android Zero-Day Flaws in Google Pixel Exploited

Trojan:Win32/Casdet!rfn

Trojan:Win32/Casdet!rfn is a pretty nasty thing. I recommend removing it as soon as possible.

Trojan:Win32/Casdet!rfn is a detection that indicates the possible presence of malware on your system. Users may encounter this detection after using pirated software or opening suspicious email attachments. In certain cases, Casdet may be a false positive detection. Casdet is a severe threat mainly used for reconnaissance and delivering other payloads to the device. It… Continue reading Trojan:Win32/Casdet!rfn