BeyondTrust Remote Access Vulnerability Exploited, Update Now
BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities enable unauthenticated command injection and privilege escalation. This means attackers…
Locklocklock Ransomware
Locklocklock is a ransomware virus designed to lock your files and demand payment to restore access. Victims can identify encrypted files by the addition of a .locklocklock extension to every…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often such modifications are made to add malicious functionality to a program. Trojan:Win32/Patched Overview Trojan:Win32/Patched is a Microsoft Defender…
New Ledger Phishing Campaign Targets Recovery Phrases
Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to lure recovery phrases from users and gain access to crypto…
SUPERLOCK Ransomware Virus Simple Step-by-Step Removal Guide
SUPERLOCK is a ransomware infection that aims at blocking access to the files and demanding a payment for getting them back. Users can distinguish the encrypted files by them containing…
Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware
Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo's file transfer software – Cleo Harmony, VLTrader, and LexiCom – which are actively being exploited. These flaws, specifically CVE-2024-50623 and CVE-2024-55956,…
Brad Garlinghouse Crypto Giveaway Scam Explained
Brad Garlinghouse Crypto Giveaway is a scam campaign that masquerades as a cryptocurrency giveaway. It falsely claimed to be organized by Ripple Foundation with Brad Garlinghouse, Ripple's CEO, as the…
Shougnoboassi.net Redirect Virus
Shougnoboassi.net is a website that you may notice appearing in your web browser. It shows a human verification button, and upon interaction redirects the user to a questionable website. In…
Aiocpa PyPI Package Targets Crypto Wallets
A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information. Unlike the previous attacks that leveraged PyPI, that generally relied…
Top 3 MMS Scams: What Threats Can Messages Bring
MMS is a rather old technology that is being pushed out of the market by proper messenger applications. Nonetheless, fraudsters seem to be interested in abusing it for their profit:…
Ivanti Fixes Authentication Bypass Vulnerability, Patch Now
Ivanti has alerted its customers to a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. This security flaw allows remote attackers to gain administrative privileges without needing…
Top 4 Signal Scams to be Aware About
Anonymous messaging app Signal becomes increasingly popular amongst regular users. Such a shift turned the attention of various cybercriminals to the app that was clean of scams beforehand. Due to…