Trojan Script Wacatac.B!ml Analysis & Removal on Windows 10/11
Trojan Wacatac is a broad detection name for many malicious programs that…
Lockbit 4.0 Released, With New Infrastructure and Features
Lockbit ransomware group steps up with a new version of its malicious…
Trojan:Win32/Patched
Trojan:Win32/Patched refers to a detection for modified versions of legitimate programs. Often…
Aiocpa PyPI Package Targets Crypto Wallets
A malicious package named aiocpa was identified on the Python Package Index…
FakeBat Loader is Back With New Tactics and Payload
After a brief decline in loader-based malvertising, the FakeBat loader has re-emerged…
UC Browser – Is it Legit? Analysis & Verdict
While browsing the Web, you can at some point find yourself with…
Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers
On October 28, 2024 Dutch cyber police launched a website reporting a…
P. Diddy Malware Scam Campaign Rides on Media Hype
A worldwide-known scandal around Sean Combs, known as P.Diddy, gave boost to…
Vilsa Trojan Stealer – What It Is
Researchers discovered a new infostealer malware dubbed Vilsa Stealer, with source code…
Trojan:Win32/LsassDump.A
Trojan:Win32/LsassDump.A malware aims at gathering system credentials from the LSASS process memory…
Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer
New malware spreading campaign now picks up steam on the Internet, luring…
Altisik Service Virus Analysis & Removal
Altisik Service is a malicious coin miner that usually installs and runs…