Top Security News

Beware: Cybercriminals Leveraging Coronavirus to Exploit Computer Users and Spread Malware It hasn't taken a lot of time for threat actors to realize the social engineering opportunity that the novel coronavirus (2019-nCoV) has presented them. The respiratory infection that originated in...
Beware: Fake FedEx Text Alerts and Emails Used in New Scam There is an awful lot of spam making the rounds, both in email and mobile text format. With an average of 300 billion emails being sent every day and the majority of those being spam that has...
Ransomware Attack Costs 300 Employees their Jobs Did you know that a ransomware attack could cost you your job? That is exactly what happened to 300 employees at an Arkansas Telemarketing firm that was forced to lay off 300 of its employees and...

Top Articles

VulkanRT

The software package known as VulkanRT has recently caused a bit of commotion online. There have been posts on various forums and online communities, made by people who got confused by the sudden appearance of an entry named "VulkanRT" in their installed programs list. Some users were surprised and confused by the new entry and, not knowing what it was, assumed it was a virus and communicated their fears online. In reality, VulkanRT is not a threat or a malicious piece of software. The RT in the name stands for "runtime libraries". Vulkan, on the other hand, is the name of a graphical API which has the purpose of providing direct control over the computer's GPU and CPU usage. VulkanRT is developed by the Khronos Group in 2014 with the participation of huge IT names such as Intel, NVidia, AMD, Google , and Apple. The API was initially...

Posted on December 29, 2017 in Browser Hijackers

Bundesliga-streams.net

The Bundesliga-streams.net website does not host any unsafe content, but it is a shady page that should be avoided. Users who come across the Bundesliga-streams.net page were likely looking for illicit streams of football (soccer) games from the German football league called the Bundesliga. We recommend you not to visit websites like the Bundesliga-streams.net as they are hosting illicit content and often have malvertising present on their page. These malvertising campaigns tend to promote low-quality products and dodgy or fake services. Uses Social Engineering Tricks The Bundesliga-streams.net site, much like many other shady pages, is likely to use a variety of social engineering techniques to manipulate the actions of the user. Among them can be: The users may be asked to download and install a fake codec pack or media player if...

Posted on November 11, 2019 in Browser Hijackers

Sodinokibi Ransomware

Sodinokibi Ransomware is a new malware threat that is gaining traction in the cybercriminal circles. Although Sodinokibi operates in the typical ransomware fashion - it infiltrates the victim's computer, uses a strong encryption algorithm to encrypt the files, and demands a payment for their restoration, analyzing its underlying code reveals that it is an entirely new malware strain and not an updated variant of an already existing ransomware. Zero-Day Exploit Facilitates First Sodinokibi Attack Sodinokibi was first detected on April 25 when it was used in an attack that exploited a zero-day Oracle WebLogic Server vulnerability. The severity of the zero-day exploit couldn’t be understated as it allowed the remote execution of code without any of the otherwise required authentication credentials. Oracle issued a patch on April 26,...

Posted on May 1, 2019 in Ransomware

More Articles

Haken

The Haken threat is a piece of malware designed to target Android devices. This threat appears to be masked as the legitimate applications that are being distributed on the official Google Play Store. Unfortunately, despite the security measures put in place by the developers of the Google Play Store, countless cybercriminals still managed to propagate their threatening creations via the official platform associated with the Android OS. Malware researchers have spotted eight applications on the Google Play Store that contain the harmful code of the Haken threat. The applications affiliated with the Haken malware seem to have boosted numbers artificially in regards to their ratings and downloads. Many authors of threatening applications use bots to boost their stats and make their shady creations look legitimate and trustworthy....

Posted on February 24, 2020 in Malware

ObliqueRAT

The ObliqueRAT (Remote Access Trojan) malware is a recently uncovered threat that seems to be targeting the Southeast Asian region, primarily. Furthermore, the ObliqueRAT appears to be utilized in attacks against businesses mainly, rather than regular users. So far, malware experts have been unable to detect a particular hacking group that may be responsible for the campaigns propagating the ObliqueRAT. The ObliqueRAT may not be very impressive when it comes to features, but it is a very stealthy threat that may remain undetected over long periods. However, since cybersecurity researchers spotted this threat, they have worked tirelessly to study it and make sure that anti-malware tools are capable of detecting it successfully. Propagation Method The propagation method employed in the spreading of the ObliqueRAT is phishing emails. The...

Posted on February 24, 2020 in Remote Administration Tools

BearClod

The BearClod malware is identified as yet another ‘clicker’ threat targeting Android devices exclusively. There are a growing number of Android threats as this is, by far, the most popular mobile OS worldwide. The BearClod threat appears to be present on more than 40 Android applications. Unfortunately, the creators of the BearClod threat have managed to penetrate the defenses of the Google Play Store, as all these applications are to be found on the official platform associated with Android software. So far, it would appear that the BearClod threat has managed to compromise over 10 million devices all around the globe. Thankfully, unlike other clicker threats that subscribe their victims to pricey services, the BearClod threat spawns unwanted advertisements, while the targets are using their devices. Users who have the BearClod...

Posted on February 24, 2020 in Malware

QuilMiner

The QuilMiner is a new cryptocurrency miner circulating the Web. Cryptocurrency miners are often listed as low-level threats, as they do not threaten your data or cause too much damage to your system’s health. Oftentimes, users may not notice that there is a cryptocurrency miner present on their computers unless they try to play a resource-heavy game or work with a resource-heavy application. The QuilMiner is designed to mine for the Monero cryptocurrency. If the QuilMiner is present on your computer, you may notice that your system’s performance has slowed down, which can be rather irritating. Furthermore, the QuilMiner also may end up reducing the lifespan of your computer, as mining for cryptocurrency causes the system to overheat for long periods. Needless to say, this is far from healthy for the components of your computer....

Posted on February 24, 2020 in Trojans

Email Search Tools

The Email Search Tools is a fraudulent application that presents itself as a useful tool that will aid users in searching through their emails. It is well known what a pain in the neck it is to try and sort through a packed, messy inbox but we guarantee you that the Email Search Tools is not the application to help you in this quest. Malware experts have listed the Email Search Tools application as a PUP (Potentially Unwanted Program). This application is an add-on compatible with the Mozilla Firefox and Google Chrome Web browsers. If you install the Email Search Tools extension, you will see a button in your browser that will redirect you to your Gmail inbox. After looking into the Email Search Tools application, security analysts concluded that this tool is not compatible with other email services apart from Gmail. The Email Search...

Posted on February 24, 2020 in Potentially Unwanted Programs

Your Search Tool

The Your Search Tool Web browser extension is yet another bogus add-on that claims to provide its users with helpful tools when this is certainly not the case. The Your Search Tool states that it will help users get more relevant results to their searches. However, instead of providing you with useful tips and features, the Your Search Tool will meddle in your Web browser settings as soon as you install it. This dodgy Web browser extension will change your default search engine by replacing it with an affiliated one – Search.yoursearchtool.com. It is likely that this new default search engine will deliver less relevant results, as it will likely promote sponsored content. This means that not only the Your Search Tool extension will not improve your browsing quality, but it will diminish it. No legitimate Web browser add-on will change...

Posted on February 24, 2020 in Potentially Unwanted Programs

Search-one.info

At first glance, the Search-one.info website appears to be a search engine. However, this is not the case. The Search-one.info page is a fake website that hosts a scheme. Upon visiting the page, users will be told that there is a font, which is missing on their systems. Then, the Search-one.info website will offer to fix that ‘issue’ by providing the user with a link to download the supposedly missing font. However, the claims of the Search-one.info site are fake, and you should never download software from untrustworthy sources like this shady website. It is not yet known whether the tactic hosted on the Search-one.info site is used to distribute PUPs (Potentially Unwanted Programs), or something far more threatening like Trojans, spyware, various cryptocurrency miners, etc. If you have visited the Search-one.info website and seen the...

Posted on February 24, 2020 in Browser Hijackers

Valid-install.com

The Valid-install.com website is a fake page that is likely to be visited by users who are in the habit of browsing shady content like illicit streaming services. It comes as no surprise that dishonest actors who offer users free pirated content also are seeking to take advantage of it and generate cash for themselves. The operators of the Valid-install.com page claim that users who want to view the content on their sites need to install a Web browser extension. They state that users who do not comply will not get access to the content in question. This may convince many users to give in and install the shady add-on promoted by the Valid-install.com site. However, such dodgy websites often promote PUPs (Potentially Unwanted Programs) to their users, so it is best to avoid installing any software pushed by pages of this kind. Another...

Posted on February 24, 2020 in Browser Hijackers

Cdorked

The Cdorked threat is designed to target Linux systems only. Cybersecurity analysts first discovered this backdoor Trojan about seven years ago. After looking into the activity of this threat, it would appear that the most dynamic period for the Cdorked Trojan was in 2013 when it was spotted on several hundred Web servers. All the compromised Web servers were designed to redirect users to corrupted pages that were meant to distribute various malware types. The main advantage of the Cdorked Trojan is that it operates very silently. The creators of the Cdorked backdoor Trojan have made sure that this threat operates almost filelessly. This means that the majority of its files and settings are stored in the system’s memory. However, malware researchers have identified one file that is affiliated with the Cdorked campaign certainly –...

Posted on February 21, 2020 in Backdoors

Ebury

The Ebury Trojan is a threat that is crafted to exploit the OpenSSH application specifically. This is achieved by employing a certain patch that is designed to alter the settings and behavior of the application in question. This is a commonly utilized strategy by many backdoor Trojans, similar to the Ebury threat. However, the difference, in this case, is that the Ebury targets Linux systems only. The end goal of the Ebury backdoor Trojan is to compromise the targeted host and then collect sensitive information like usernames, passwords, etc. All the gathered data will then be transferred to the C&C (Command & Control) servers of the operators of the Ebury backdoor Trojan swiftly. The creators of this nasty threat have used some interesting methods when it comes to collecting data. The Ebury Trojan is capable of detecting failed login...

Posted on February 21, 2020 in Backdoors

ChoiceFinder

The ChoiceFinder application is designed for Mac computers specifically. It is likely that you have come across the ChoiceFinder application while downloading and installing a bundle of freeware applications. Oftentimes, such software bundles contain additional applications that the user never asked for. To convince the user to install such applications, they may be told that it will enhance the stability of their systems or their Web browsing experience. However, this is usually untrue, and this is the case with the ChoiceFinder application, certainly. The ChoiceFinder application is likely marketing itself as a useful tool that will help users get more relevant results for their searches online. However, instead of enhancing their search results in any way, the ChoiceFinder application is likely to do exactly the opposite. This...

Posted on February 21, 2020 in Potentially Unwanted Programs

Hilfr.pro

The Hilf.pro site, a bogus page, which is not hosting any valuable content, is likely to waste its visitors’ time only. The Hilf.pro tricks users into launching the page by claiming to host a video that may appear very engaging. As soon as the user opens the dubious website, they will see a fake video prompt that pretends to be loading the content the visitor wants to view. Unfortunately, that is nothing more than a trick, as the Hilf.pro site does not contain any videos. As the fake video prompt appears to be loading the nonexistent video, the users will be prompted to click on the ‘Allow’ button on their screens. The site claims that unless the visitors comply, they will be unable to view the content. However, clicking the button in question will permit the shady website to display Web browser notifications. This means that users who...

Posted on February 21, 2020 in Browser Hijackers

ProcessFresh

The ProcessFresh application is a tool compatible with computers running OSX. This dubious application may promote itself as an optimization tool that will help you improve the stability of your system, but we can assure you that this is not the case definitely. Malware researchers have identified the ProcessFresh application as adware. This means that users who have happened to install the ProcessFresh application may notice a sudden spike in the number of advertisements displayed on the websites they visit. The ProcessFresh adware is likely to plant various advertisements into the Web pages visited by the user – flashing alerts, banners, annoying notifications, hyperlinks in text, pop-up windows, etc. You can imagine that viewing a large amount of unwanted and often irrelevant advertisements every time you open your Web browser can...

Posted on February 21, 2020 in Potentially Unwanted Programs

Sisewepod.com

Users who tend to browse shady websites often (adult entertainment sites, gambling platforms, illicit streaming pages, etc.) are more likely to stumble upon the Sisewepod.com site. This website is nothing more than a fake page that is designed to mislead users into allowing it to display Web browser notifications. The Sisewepod.com website is likely to claim to host very engaging content, like an interesting video or a gallery of images, to attract users’ attention. Unfortunately, this is definitely not the case. The Sisewepod.com will ask the users to click on the ‘Allow’ button if they want to proceed and view the content they were promised. Following the instructions of the dodgy Sisewepod.com site will not provide you with access to any interesting or meaningful content; instead, it will allow this page to send you...

Posted on February 21, 2020 in Browser Hijackers

Clickkmobi.com

The Clickkmobi.com is an untrustworthy website that may appear to host various giveaways or engaging content. However, this is not true most definitely, as there is no meaningful content hosted on this website, and any giveaways and raffles affiliated with the Clickkmobi.com page may be fake. The creators of the Clickkmobi.com website have built it with one goal in mind – to hijack their visitors’ Web browser notifications. This is the so-called ‘Click ALLOW to Continue’ tactic used by numerous shady websites online. As soon as the Clickkmobi.com website is launched, it will request that the users click on the ‘Allow’ button spawned on their screen. If the user complies and clicks on the button, the Clickkmobi.com website will receive permission to exhibit notifications in the user’s Web browser. This may not seem something that you...

Posted on February 21, 2020 in Browser Hijackers
1 2 3 4 5 6 7 8 9 10 11 1,399