Palo Alto Network Expedition Tool Exploited, CISA Warns
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an alert about an actively exploited critical vulnerability in Palo Alto Networks’ Expedition software. This tool, typically used for migrating firewall…
Arma dei Carabinieri Virus
The *Arma dei Carabinieri* message is a banner that may appear on your PC, attempting to mimic notifications from Italy's national gendarmerie. Cybercriminals use their name and authority to convince…
Trojan:Win32/Offloader.EA!MTB
Trojan:Win32/Offloader.EA!MTB is malware designed to establish unauthorized access to a target system or deliver a payload of additional malware. This detection is sometimes associated with uTorrent installers, and in such…
GPT-4o Used for Scams and Voice Phishing
Voice-based scams grow increasingly sophisticated with the integration of advanced AI technologies. Cybersecurity researchers were able to simulate a successful attack using AI and social engineering to gain access to…
UC Browser – Is it Legit? Analysis & Verdict
While browsing the Web, you can at some point find yourself with an installer file for a program called UC Browser. This dubious program appears as a normal web browser,…
QR Code Phishing Scams
Scammers use the speed and simplicity of QR code interactions, quishing attacks have emerged as a new threat that hides in plain sight. Since scanning only requires a quick image…
Nokia Data Leaked, Put for Sale on the Darknet
On November 4, 2024 an infamous threat actor that goes by IntelBroker published a message about selling a huge piece of Nokia source code. The leak allegedly comes from one…
PUA:Win32/Webcompanion
PUA:Win32/Webcompanion is a potentially unwanted program positioned as a malicious link blocker. In fact, it modifies browser settings and installs additional unwanted software and browser extensions. The program is commonly…
Fake Copyright Emails Spread Lumma, Rhadamantys Stealers
Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma Stealer and Rhadamanthys malware, specifically targeting Taiwanese Facebook business and advertising accounts. Let's break down how this works…
PUA:Win32/DNDownloader
You can witness a PUA:Win32/DNDownloader detection while installing a certain software. This detection refers to a potentially unwanted software that attempts to run unwanted apps along with the “main” installation.…
Spectre Vulnerability Keeps Haunting AMD, Intel CPUs
Researchers have demonstrated an exploit targeting the speculative execution vulnerability in the Indirect Branch Predictor Barrier (IBPB). Although the flaw, known as Spectre Flaw, is known for quite some time…
Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers
On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following Operation Magnus. Law enforcement managed to take over and disable…