25 Chrome Extensions Compromised, Exposing 2M+ Users
A targeted attack on Chrome extensions publishers compromised the add-ons uploaded to…
Apache Traffic Control Critical SQLi Vulnerability Fixed
Apache Traffic Control platform got a critical security patch that addresses a…
MicrosoftHost.exe
MicrosoftHost.exe is a malicious process that the malware creates to disguise itself…
AlienWare Ransomware
AlienWare is a type of ransomware designed to lock your files and…
Lockbit 4.0 Released, With New Infrastructure and Features
Lockbit ransomware group steps up with a new version of its malicious…
LockBit Ransomware Developer Arrested and Extradicted in Israel
US authorities have detained a developer associated with the LockBit group, one…
Trojan:Win32/Pomal!rfn
Trojan:Win32/Pomal!rfn is a detection commonly encountered when downloading programs like emulators or…
Novalock Ransomware
Novalock is a sophisticated form of malware designed to encrypt your files…
BeyondTrust Remote Access Vulnerability Exploited, Update Now
BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two…
Locklocklock Ransomware
Locklocklock is a ransomware virus designed to lock your files and demand…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often…
New Ledger Phishing Campaign Targets Recovery Phrases
Owners of popular hardware cryptocurrency wallets Ledger have become the target of…