News, Tips, Security Lab

Godaddy Refund Phishing Scam

GoDaddy Refund Phishing Emails Spread Infostealer

Hackers started using GoDaddy Refund Emails as a disguise to trick the users into installing malware. In order to deploy…

Philadelphia Inquirer is Struck by Cuba Ransomware

The Philadelphia Inquirer, Philadelphia’s largest newspaper by circulation and third-longest-running newspaper in the USA, suffered a cyberattack on May 15,…

FIN7 Hack Group Resumed Activity, Linked to Clop Ransomware

Microsoft analysts report that last month the notorious hacker group FIN7 (also known as Carbanak, Navigator and others) resumed its…

ChatGPT Causes New Wave of Fleeceware

Artificial intelligence is one of the most significant advances in technology. It is used in one way or another everywhere,…

Oneetx.exe – What is that process? Oneetx Removal

Oneetx.exe is a malicious process, related to Amadey dropper malware. It can be spectated in the Task Manager, with seemingly…

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Following recent fixes for a large number of UEFI vulnerabilities, worldwide-known PC and laptop vendor HP is releasing a new BIOS update. This time around, two serious vulnerabilities affecting a…

famous spyware attacks

The 5 Most Famous Spyware Attacks

Spyware can be called the most sophisticated malware these days. It never acts openly, uses tricky techniques, and appears more often with other viruses. Together with its brother-in-law – stealer…

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

Not a long time ago, a cybersecurity analyst posted a video on YouTube where he shows the vulnerability in ransomware samples used by well-known ransomware groups. In the footage, expertly…

remove yahoo search

Yahoo Search: How to Remove Yahoo from Chrome?

Yahoo Search is a legitimate search engine that exists for over 25 years. When chosen by desire, it offers all the basic functions of any search engine. However, there are…

malware

Can Malware Spread Through a Shared Wi-Fi Connection?

It is hard to imagine the modern world without wireless connections. Wi-Fi routers and Bluetooth devices have become a part of our everyday life. And yet, not more than fifteen…

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

A vulnerability has been discovered (CVE not yet issued) in uClibc and uClibc-ng C standard libraries. These libraries are vastly used in IoT devices. The newly found vulnerability makes it…

What is Scareware

What is Scareware and How Not to Buy Into It?

Scareware is a widespread Internet fraud scheme that intimidates victims into buying unnecessary or harmful software taking advantage of their ignorance. Scareware usually exploits fears of having a computer virus…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that harms the iControl REST users. That solution is a framework offered by the F5 Corporation as an advanced tool for…

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Analysis of more than 40 chats with victims allowed the specialists to figure out some interesting details about the internal structure and the style of negotiation. Conti and Hive ransomware…

What is a Smurf Attack? How does it work?

What is a Smurf Attack? How Does It Work?

Smurfing, or smurf attack, is a kind of DDoS attack. It has a pretty easy mechanism, but counteracting it may be as hard as it could be with the most…

Typosquatting

What is Typosquatting: How Does It Work in 2022?

There is a special trap on the Internet for people, who type the website address into the browser’s address bar, instead of using search. Yes, few people do so in…

Rootkit Attack

How to Prevent a Rootkit Attack?

Maybe you’ve already heard somewhere the name rootkit1. The name which comes from the Linux and Unix operating systems means the most privileged account admin that is called “…

  1. Rootkit malware