Broom Cleaner App (Virus Removal)

Broom Cleaner is a program presented as a PC cleaning utility that can be harmful and difficult to remove.

Broom Cleaner is an unwanted program that at first glance seems to be a safe tool for cleaning and optimizing your computer. However, in reality, once installed, it performs unwanted changes to system settings, shows ads, or even installs additional unwanted programs. This can cause significant disruption to your computer and leak confidential information. Let’s… Continue reading Broom Cleaner App (Virus Removal)

RegAsm.exe

RegAsm.exe is a critical system element that can only be run during product registration.

The RegAsm.exe process is an important component of the Windows operating system associated with the .NET Framework. This utility is designed to register .NET assemblies in the Windows registry, allowing COM clients to call managed applications. Let’s analyze its functionality and see whether malware can abuse it. What is RegAsm.exe? RegAsm.exe (Assembly Registration Tool) is… Continue reading RegAsm.exe

PC Accelerate

PC Accelerate is misleading, degrades PC performance, violates privacy and uses deceptive installation methods.

PC Accelerate is a questionable software that is presented as a useful utility designed to optimize your computer’s performance. In reality though, this software can do more harm than good. Installing such applications often leads to unintended consequences, from system slowdowns to serious security threats. What is PC Accelerate? PC Accelerate is a potentially unwanted… Continue reading PC Accelerate

Walliant App

Using Walliant can significantly increase traffic consumption and reduce network throughput.

The Walliant application is a Potentially Unwanted Application (PUA). It is promoted as an app that automatically changes desktop wallpapers. Though it in fact has hidden functionality: hijacking your bandwidth, it works as proxyware. This can eventually lead to rather unpleasant consequences. This unwanted app has a website that allows users to download it. However,… Continue reading Walliant App

Taskbarify Unwanted Application

Things are not always as they seem at first glance.

Taskbarify is unwanted software that claims it is a tiny little Windows tweaker. However, it also turns the device into a proxy server without the user’s knowledge. Let me show you what is so dangerous about this utility, and how to remove it. What is Taskbarify? Taskbarify is a Windows utility classified as a Potentially… Continue reading Taskbarify Unwanted Application

DLL Search Order Hijacking Technique Bypasses Protection

Another way to use legitimate Windows components for illegal purposes is found.

A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This method capitalizes on executables in the trusted WinSxS folder of Windows 10 and 11, allowing threat actors to execute malicious code without needing high privileges​​. How Does DLL Search Order Hijacking Work? Researchers detect a novel DLL search order hijacking variant. It leverages… Continue reading DLL Search Order Hijacking Technique Bypasses Protection

PoolParty Injection Techniques Circumvent EDR Solutions

Enthusiasts presented 8 new malware injection ways, based on Windows ThreadPool system

A set of process injection techniques, named PoolParty, was presented at the Black Hat Europe 2023 conference. A set of 8 tricks allows to force running any malicious code, and circumvents protection of top-notched EDR solutions. PoolParty Process Injection Exploits Windows Mechanisms The initial presentation of the techniques, along with further analysis, reveals a chain… Continue reading PoolParty Injection Techniques Circumvent EDR Solutions

Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

Information security experts have published a PoC exploit for a privilege escalation vulnerability in the Win32k driver that was fixed in May. Let me remind you that this bug received the identifier CVE-2023-29336 (7.8 points on the CVSS scale) and was discovered by Avast researchers. CVE-2023-29336 has been reported to affect systems running Windows 10… Continue reading Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

What is “Windows Key Code Is Not Valid And Seems Pirated”?

Scammers bait users to contact them by phone, showing them a scary banner

Windows Key Code Is Not Valid And Seems Pirated appears to be a new scary scam approach used to trick Windows users. Banners with this prompt may appear out of nowhere, and can really scare inexperienced users. Let me explain to you what’s the matter with this banner, if you really have any issues, and… Continue reading What is “Windows Key Code Is Not Valid And Seems Pirated”?

How to Remove Windows Defender Security Warning Scam

Windows Defender label is not always trustworthy

Have you ever had a Windows Defender security warning pop up randomly while browsing? This type of malicious activity wants you to get in touch with scammers. Fortunately, you can quickly get rid of it. Next, we will tell you how to remove the Windows Defender security warning scam and protect yourself from other viruses.… Continue reading How to Remove Windows Defender Security Warning Scam