Sec-tl Pop-Up Virus
Sec-tl pop-up ads are malicious push notifications that parasite legitimate browser functionality. Fraudulent actors that stand behind this chain of websites earn money by showing hundreds of ads in such…
NC Quick Pass Toll SMS Scam Targets North Carolina
NC Quick Pass text messages is a new wave of SMS scam that targets people from North Carolina. It pretends to be a genuine notification from state authorities, and requests…
Evil Corp, LockBit Ransomware Members Arrested, Structure Revealed
Recent UK NCA publications uncover the identities of 16 cybercrime actors that belong to Evil Corp/REvil and LockBit ransomware groups. Some of them were detained synchronously with the news, with…
Trojan:Win32/LsassDump.A
Trojan:Win32/LsassDump.A malware aims at gathering system credentials from the LSASS process memory dump
First-tl Pop-Up Virus
First-tl pop-up ads are malicious push notifications (like a Sec-tl sites) that parasite legitimate browser functionality. Fraudulent actors that stand behind this chain of websites earn money by showing hundreds…
URL:Blacklist (Avast)
URL:Blacklist is a name of detection that several antivirus programs use to flag a dangerous site being blocked. It typically happens after a click on a link or an advertisement,…
PUABundler:Win32/Rostpay
PUABundler:Win32/Rostpay is an antivirus detection related to the software released by Rostpay LLC. Antivirus programs detect it because it contains a lot of additional unwanted programs (PUA). Although their applications…
Multiple Vulnerabilities in Linux CUPS Discovered, Allows for RCE
In a recent release, the developers of Linux printing system CUPS disclosed fixing a selection of vulnerabilities. When successfully exploited, they can provide adversaries with the ability to execute arbitrary…
Lumma Stealer Targets Transportation Companies
Hackers appear targeting logistics and transportation companies in North America with Lumma Stealer. A phishing campaign utilized various info-stealers and remote access trojans for espionage. Experts suspect several cybercrime groups…
Personal Data vs. Sensitive Data: What is the Difference?
People often confuse personal data and sensitive data. But what exactly is the difference between them? What makes data sensitive, and what personal? Why are corporations so eager to collect…
Data Breach vs Data Leaks: Differences
The terms “data breach” and “data leaks” are often used interchangeably, but they are not same enough for this to be a correct application. Sure they share similarities, but they…
Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer
New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked to press certain key combinations to prove they are not…