News, Tips, Security Lab

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of…

ParseThru Vulnerability Threatens Go-Based Applications

Researchers have discovered a vulnerability called ParseThru — the bug affects Go-based products and can be abused to gain unauthorized…

BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator

The operators of the BlackCat ransomware (aka ALPHV) claimed responsibility for hacking Creos Luxembourg, which operates a gas pipeline and…

STOP Ransomware Spreads through Discord, Carrying RedLine Stealer

An infamous STOP/Djvu ransomware adopted a new spreading tactic. According to the report of Avast Threat Labs, a malware intelligence…

Drinker App – what is Drinker Adware?

The Drinker app is another example of a malicious program that disguises itself as a useful utility for your PC.…

Can Someone Track My Device When Location Settings Off?

Can Someone Track My Device When Location Settings Off?

Any smartphone already has built-in location tracking services. At the beginning location tracking was created for navigation, but it was later used for other purposes. This feature is very convenient…

How To Know If Your Phone is Hacked?

How To Know If Your Phone is Hacked?

If your phone stopped working correctly and started showing obvious performance errors, then something is wrong. If you notice that your smartphone has begun to turn itself off or on,…

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Avast has discovered that DevilsTongue spyware, created by Israeli company Candiru, exploited a 0-day vulnerability in Google Chrome to spy on journalists and others in the Middle East. The vulnerability…

Candiru Malware Uses 0-day Vulnerability In Chrome

Candiru Malware Uses 0-day Vulnerability In Chrome

Following Microsoft, Google and Citizen Lab, another revelation came from Avast researchers. They discovered that the Israeli spyware Candiru used a 0-day vulnerability in Google Chrome. Their main target was…

Spam Phone Calls Revenge

Spam Phone Calls Revenge

Statistics show that an average of 1,900 spam calls are made every second. Given recent statistics about it, it is clear that it is another problem on the head of…

Fraudsters Are Running a Malicious Advertising Campaign through Google Search

Fraudsters Are Running a Malicious Advertising Campaign through Google Search

Malwarebytes, an information security company, has discovered a large malicious campaign that skillfully uses ads and Google search. A phishing campaign using Windows tech support is spreading through Google Ads.…

How to Stop Spam Texts: Tips to Deal With Fake Text Message

How to Stop Spam Texts: Tips to Deal With Fake Text Message

The spam texts can include spam emails and spam calls. These are all unwanted and often annoying text messages whose sender you don’t know. The purpose of such spam is…

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Google Threat Analysis Group (TAG) specialists reported that the Russian-speaking group Turla (aka Waterbug and Venomous Bear) created a fake Android application, allegedly designed to carry out DDoS attacks and…

CloudMensis Malware Attacks MacOS Users

CloudMensis Malware Attacks MacOS Users

ESET experts have discovered the CloudMensis malware, which is used to create backdoors on devices running macOS and subsequently steal information. The malware received its name due to the fact…