Trojan:Win32/LsassDump.A
Trojan:Win32/LsassDump.A malware aims at gathering system credentials from the LSASS process memory dump
First-tl Pop-Up Virus
First-tl pop-up ads are malicious push notifications (like a Sec-tl sites) that parasite legitimate browser functionality. Fraudulent actors that stand behind this chain of websites earn money by showing hundreds…
URL:Blacklist Detection Avast and AVG Warnings
URL:Blacklist is a security detection used by Avast and AVG antivirus programs to flag potentially dangerous websites. This warning typically appears after clicking a link, advertisement, or sometimes immediately upon…
PUABundler:Win32/Rostpay
PUABundler:Win32/Rostpay is an antivirus detection related to the software released by Rostpay LLC. Antivirus programs detect it because it contains a lot of additional unwanted programs (PUA). Although their applications…
Multiple Vulnerabilities in Linux CUPS Discovered, Allows for RCE
In a recent release, the developers of Linux printing system CUPS disclosed fixing a selection of vulnerabilities. When successfully exploited, they can provide adversaries with the ability to execute arbitrary…
Lumma Stealer Targets Transportation Companies
Hackers appear targeting logistics and transportation companies in North America with Lumma Stealer. A phishing campaign utilized various info-stealers and remote access trojans for espionage. Experts suspect several cybercrime groups…
Personal Data vs. Sensitive Data: What is the Difference?
People often confuse personal data and sensitive data. But what exactly is the difference between them? What makes data sensitive, and what personal? Why are corporations so eager to collect…
Data Breach vs Data Leaks: Differences
The terms “data breach” and “data leaks” are often used interchangeably, but they are not same enough for this to be a correct application. Sure they share similarities, but they…
Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer
New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked to press certain key combinations to prove they are not…
Altisik Service Virus Analysis & Removal
Altisik Service is a malicious coin miner that usually installs and runs on the target system without the explicit consent of the PC owner. It disguises itself as a Windows…
What are Facebook Job Scams and How to Avoid Them?
Facebook job scams are a relatively recent but fast-growing type of scam on the social network. It targets users who are looking for a job and are members of themed…
Temu Allegedly Hacked, Data Put on Sale On The Darknet
Chinese retailer Temu allegedly suffered a huge data breach. Hackers have put a leaked database for sale on the Darknet, which contains 87 million records with customer information. The company,…