Lockbit 4.0 Released, With New Infrastructure and Features
Lockbit ransomware group steps up with a new version of its malicious software, LockBit 4.0, and with adjustments to their Darknet infrastructure. Although minor, these updates are remarkable due to…
LockBit Ransomware Developer Arrested and Extradicted in Israel
US authorities have detained a developer associated with the LockBit group, one of the most active ransomware creators. Investigators allege he has been working as a programmer for the notorious…
Trojan:Win32/Pomal!rfn: Detection & Removal Guide 2025
Trojan:Win32/Pomal!rfn is a detection commonly encountered when downloading programs like emulators or games. This heuristic detection, flagged by Microsoft Defender, frequently raises questions about whether it represents a genuine threat…
Novalock Ransomware
Novalock is a sophisticated form of malware designed to encrypt your files and then demand payment for their release. It belongs to the Globeimposter virus family, and shares a lot…
BeyondTrust Remote Access Vulnerability Exploited, Update Now
BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities enable unauthenticated command injection and privilege escalation. This means attackers…
Locklocklock Ransomware
Locklocklock is a ransomware virus designed to lock your files and demand payment to restore access. Victims can identify encrypted files by the addition of a .locklocklock extension to every…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often such modifications are made to add malicious functionality to a program. Trojan:Win32/Patched Overview Trojan:Win32/Patched is a Microsoft Defender…
New Ledger Phishing Campaign Targets Recovery Phrases
Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to lure recovery phrases from users and gain access to crypto…
SUPERLOCK Ransomware Virus Simple Step-by-Step Removal Guide
SUPERLOCK is a ransomware infection that aims at blocking access to the files and demanding a payment for getting them back. Users can distinguish the encrypted files by them containing…
Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware
Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo's file transfer software – Cleo Harmony, VLTrader, and LexiCom – which are actively being exploited. These flaws, specifically CVE-2024-50623 and CVE-2024-55956,…
Brad Garlinghouse Crypto Giveaway Scam Explained
Brad Garlinghouse Crypto Giveaway is a scam campaign that masquerades as a cryptocurrency giveaway. It falsely claimed to be organized by Ripple Foundation with Brad Garlinghouse, Ripple's CEO, as the…
Shougnoboassi.net Redirect Virus
Shougnoboassi.net is a website that you may notice appearing in your web browser. It shows a human verification button, and upon interaction redirects the user to a questionable website. In…
