Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers
According to cybersecurity specialists from Cyble, attackers distribute miners and the RedLine infostealer using download sites for the fake MSI Afterburner utility. Over the past three months, more than 50…
Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency
A Windows malware designed to steal cryptocurrency and clipboard contents installs a malicious VenomSoftX Chrome extension on users' machines. The extension works like a RAT (Remote Access Trojan), stealing victims'…
Apple ID Scams: Identify and Prevent Apple Phishing Email
Apple users are believed to be protected from all sorts of fraud and hacking. That’s because Apple designs its technologies with all required privacy and security requirements. But alas, fraudsters…
Black Friday Scams: Ways to Detect & Avoid Shopping Frauds
As the main shopping event of the year approaches, Black Friday shopping scams have into view. Con actors from all over the world try to create the most convincing fraud,…
Exploit for Vulnerabilities ProxyNotShell Appeared on the Network
Experts warned that an exploit for two high-profile vulnerabilities in Microsoft Exchange, which are collectively called ProxyNotShell, has appeared in the public domain. Vulnerabilities have been used by hackers before,…
Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years
Since 2020, some information security specialists have helped victims, as individuals and companies affected by the Zeppelin ransomware. The fact is that a number of vulnerabilities were found in the…
Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years
Security professionals at Unit221b found vulnerabilities in the Zeppelin ransomware encryption mechanism. Experts managed to use them to create a working decryptor that they have been using since 2020 to…
What Is an Evil Twin Attack? How Does It Work?
How often do we connect to free Wi-Fi networks in public places? Whether to post Instagram stories with a cup of coffee we just bought or to make edits to…
Mirai Botnet RapperBot Conducts DDoS Attacks on Game Servers
The researchers warned that the RapperBot Mirai botnet has resumed activity, and now the updated malware is used for DDoS attacks on game servers, although the exact goals of the…
How to Stress Test Your PC’s CPU
Stress testing your CPU is the surest way to discover the true limits of your computer's capabilities. Read on to learn how to stress test your CPU and put your…
PCspoF Attack Could Disable Orion Spacecraft
A team of researchers from the University of Michigan, the University of Pennsylvania, and NASA have detailed a TTEthernet (Time-Triggered Ethernet) PCspoF attack that could disable the Orion spacecraft. Experts…
Pretexting in Cyber Security: Facts to Know
Pretexting is a type of social engineering in which an attacker gains access to information, a system, or a service by deception. In doing so, the attacker provides a false…