Spectre Vulnerability Keeps Haunting AMD, Intel CPUs
Researchers have demonstrated an exploit targeting the speculative execution vulnerability in the Indirect Branch Predictor Barrier (IBPB). Although the flaw, known as Spectre Flaw, is known for quite some time…
Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers
On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following Operation Magnus. Law enforcement managed to take over and disable…
PUABundler:Win32/MediaGet
PUABundler:Win32/MediaGet is a Russian potentially unwanted program designed for accessing pirated content. Like most similar software, it installs some unnecessary programs onto the system during installation and also turns the…
PrimeLookup Extension Removal Guide
PrimeLookup is a Chrome extension that may unexpectedly appear among your browser's add-ons, causing your search queries to be redirected. As a browser hijacker, it poses a subtle threat to…
CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks
A critical vulnerability in Fortinet was exploited in the wild. Although the attackers did not deploy malware, they managed to steal technical information about the devices. New Fortinet Flaw Has…
DISM Host Servicing Process High CPU Usage
In this post, we explore what the DISM Host Servicing Process is. What should you do if it uses too many CPU resources? Can you uninstall DismHost.exe? I will show…
Removal Guide For The ZoomFind Chrome Extension
ZoomFind is a Chrome extension that may unexpectedly appear among the others, causing the browser to redirect your search queries. It belongs to the class of browser hijackers and poses…
Hot Topic Data Breach Exposes of 350 Million Customers
Data breach of a known US retailer Hot Topic leaks a selection of personally identifiable information of 350 million chain’s customers. Such a worrying conclusion comes from the database posted…
Removal Guide For The SwiftSeek Chrome Extension
The SwiftSeek is a browser extension that may unexpectedly appear among the others, causing the browser to redirect your search queries. It belongs to the class of browser hijackers and…
Roundcube Webmail Vulnerability Exploited in Real-World Attacks
Vulnerability in Roundcube Webmail service appears to be exploited in real-world attacks. The flaw that falls under designation of stored XSS vulnerability allows hackers to target government agencies of ex-USSR…
Trojan:Script/Obfuse!MSR
Trojan:Script/Obfuse!MSR is a generic detection of a malicious script that abuses command interpreters to execute commands or binaries. What distinguishes this threat from others is its emphasis on a high…
Kaspersky Returns with UltraAV and UltraVPN: Are They Safe?
Kaspersky, an infamous Russian antivirus brand, is now back on the US market with its off-branded software, UltraAV antivirus and UltraVPN. The company was forced out of the US accused…
