Apache Traffic Control Critical SQLi Vulnerability Fixed
Apache Traffic Control platform got a critical security patch that addresses a major vulnerability that could let attackers execute arbitrary SQL commands on its database. It has got a severity…
MicrosoftHost.exe
MicrosoftHost.exe is a malicious process that the malware creates to disguise itself as a benign process. Users may witness high CPU load coming from this specific process. Despite its name,…
AlienWare Ransomware
AlienWare is a type of ransomware designed to lock your files and hold them hostage until you pay up. It’s sneaky and frustrating, leaving your data scrambled and adding a…
Lockbit 4.0 Released, With New Infrastructure and Features
Lockbit ransomware group steps up with a new version of its malicious software, LockBit 4.0, and with adjustments to their Darknet infrastructure. Although minor, these updates are remarkable due to…
LockBit Ransomware Developer Arrested and Extradicted in Israel
US authorities have detained a developer associated with the LockBit group, one of the most active ransomware creators. Investigators allege he has been working as a programmer for the notorious…
Trojan:Win32/Pomal!rfn: Detection & Removal Guide 2025
Trojan:Win32/Pomal!rfn is a detection commonly encountered when downloading programs like emulators or games. This heuristic detection, flagged by Microsoft Defender, frequently raises questions about whether it represents a genuine threat…
Novalock Ransomware
Novalock is a sophisticated form of malware designed to encrypt your files and then demand payment for their release. It belongs to the Globeimposter virus family, and shares a lot…
BeyondTrust Remote Access Vulnerability Exploited, Update Now
BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities enable unauthenticated command injection and privilege escalation. This means attackers…
Locklocklock Ransomware
Locklocklock is a ransomware virus designed to lock your files and demand payment to restore access. Victims can identify encrypted files by the addition of a .locklocklock extension to every…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often such modifications are made to add malicious functionality to a program. Trojan:Win32/Patched Overview Trojan:Win32/Patched is a Microsoft Defender…
New Ledger Phishing Campaign Targets Recovery Phrases
Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to lure recovery phrases from users and gain access to crypto…
SUPERLOCK Ransomware Virus Simple Step-by-Step Removal Guide
SUPERLOCK is a ransomware infection that aims at blocking access to the files and demanding a payment for getting them back. Users can distinguish the encrypted files by them containing…