Emotet Has Resumed Activity after a Three-Month Break
Experts noticed that this week Emotet resumed its activity and after a…
Fake BSOD Scams Target Users Visiting Fake Adult Sites
The blue screen of death is probably the most unpleasant thing Windows…
BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11
ESET experts reported that the BlackLotus UEFI bootkit, which is sold on…
New stealthy “Beep” malware focuses heavily on evading detection
Cybercriminals periodically develop something new. Sometimes it is an updated version of…
IceBreaker Backdoor Emerged, Exploiting New Phishing Way
A new player has appeared in cyberspace, with surprisingly new methods. A…
Vulnerability in KeePass Allows Stealing All User Passwords in Plain Text
The developers of the open-source password manager KeePass explain that a vulnerability…
Attackers Can Use GitHub Codespaces to Host and Deliver Malware
Trend Micro reports that the GitHub Codespaces cloud development environment, available to…
Google Search Malvertising: Fake Ads of Free Programs in Google Ads
Google Search malvertising is an unpleasant phenomenon of malicious advertisements in search…
Dangerous Virus & Malware Threats in 2023
Virus and malware threats are constantly evolving and become more sophisticated and…
Security Breach
A security breach is an unauthorized access to a device, network, program,…
Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers
The Raspberry Robin worm uses new tactics to evade detection and seeks…
Huge Ransomware List by Gridinsoft Research – Part #2
We talked a lot about notorious ransomware examples in Part #1 of…