Home > Martin Beltov

Author Archive: Martin Beltov - Page 14

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
stf-Try2Cry-virus-remove-malware

.Try2Cry Virus File (Try2Cry Ransomware) – Remove It

.Try2Cry file extension is placed on all of your files? .Try2Cry Virus File is also known as Try2Cry ransomware which locks files on a computer and may demand money to be paid at some point for unlocking them. Try2Cry Ransomware…

THREAT REMOVAL
stf-Panther-virus-remove-malware

.panther Virus File (Panther Ransomware) – Remove It

.panther file extension is placed on all of your files? .panther Virus File is also known as Panther ransomware which locks files on a computer and may demand money to be paid at some point for unlocking them. Panther Ransomware…

THREAT REMOVAL
EmailCheckNow redirect image

Remove EmailCheckNow Redirect

EmailCheckNow redirect is showing up in your browser programs? EmailCheckNow is a suspicious domain because of the page redirects that can happen in your browser programs. EmailCheckNow can push various full page advertisements and redirects. A single browser session could…

CYBER NEWS

CVE-2020-9497: Severe Apache Guacamole Zero-Day Vulnerability Found

The Apache Guacamole remote desktop gateway has been identified to contain zero-day vulnerabilities. The identified issues are described as Reverse RDP vulnerabilities which allows criminals to take over the sessions. Identified issues are now tracked in the CVE-2020-9497 advisory. Zero-Day…

CYBER NEWS

EKANS Ransomware (Snake) Attacks Industrial Systems Once Again

The EKANS ransomware which is known as Snake is one of the most prolific hacking tools which are used in large-scale and targeted campaigns against industrial plants. A recently discovered hacking offensive has uncovered that this malware is once again…

THREAT REMOVAL
ProductManualsPro redirect image

Remove ProductManualsPro Redirect

ProductManualsPro redirect is showing up in your browser programs? ProductManualsPro is a suspicious domain because of the page redirects that can happen in your browser programs. ProductManualsPro can push various full page advertisements and redirects. A single browser session could…

CYBER NEWS

APT15 Hackers Attacked Chinese Minority With Android Spyware

Security researchers detected a surge of sophisticated targeted attacks that originate from the well-known APT15 hacking group. The targets appear to be the Uyghur community living in China and following the incidents analysis it appears that the criminals may be…

CYBER NEWS

EvilQuest Mac Ransomware Distributed via Infected App Installers

Mac security is once again impacted by a very dangerous threat called the Evilquest ransomware. This is a rare and new malware which has been detected in software installers that have the virus code embedded in them. In comparison with…

CYBER NEWS

StrongPity Hackers Launches Spyware Attack Against Turkey and Syria Targets

Security researchers have detected that an ongoing attack is being carried out by a hacking group called StrongPity using spyware files. The findings shows that this particular campaign appears to be focused against Kurdish targets which are present in these…

CYBER NEWS

Payment Card Skimming Code Hidden in eCommerce Sites Images

Computer criminals have devised a new infection mechanism that inserts virus code into the meta data of images which are uploaded to eCommerce sites and portals. This method relies on the saving of the code in the meta data which…

THREAT REMOVAL
MyAudioTab Toolbar redirect image

Remove MyAudioTab Toolbar Redirect

MyAudioTab Toolbar redirect is showing up in your browser programs? MyAudioTab Toolbar is a suspicious domain because of the page redirects that can happen in your browser programs. MyAudioTab Toolbar can push various full page advertisements and redirects. A single…

CYBER NEWS

Microsoft Office 365 Users Targeted By Malware SLK Files

Microsoft Office 365 users are the newest victims of a massive phishing attacks designed to blackmail them into opening malware files. The malicious files are hosted in SLK files whih also include a new infection mechanism. New Intrusion Technique Used…

THREAT REMOVAL
stf-.credo-virus-file-Dharma-ransomware-note

.credo Virus File (Dharma Ransomware) – Remove It

A new dangerous .credo ransomware virus has been detected in a large-scale attack campaign. The initial reports indicate that these samples are part of the Dharma ransomware family — one of the most famous groups of malware which are being…

CYBER NEWS

GoldenSpy Trojan Installed via Legitimate Chinese Tax Application

The distribution of the GoldenSpy Trojan, a prominent remote access malware, has been found to infect users via a legitimate Chinese tax application. It appears that the virus code is bundled from within the software and is made part of…

THREAT REMOVAL

WastedLocker Ransomware Virus Removal and Recovery Guide

The article presents detailed information about ransomware as well as a step-by-step guide on how to remove its malicious files from an infected system. You will also be presented with a how-to potentially recover encrypted files guide. WastedLocker Ransomware The…

CYBER NEWS

Self-Propagating Lucifer Malware Set Against Windows Computers

An advanced Microsoft Windows malware called Lucifer has been found to infect target computers using a very sophisticated features set. It has been detected in an active attack campaign which features a novel infection techniques by “bombarding” computer hosts with…

CYBER NEWS

Telegram Has Been Breached: Millions of Users Data Stolen By Hackers

The popular messaging Telegram messaging application has been breached by an unknown hacking group. This has resulted in the theft of internal databases which has allowed the criminals to access personal information of millions of users who are registered for…

CYBER NEWS

Android Ransomware Distributed as COVID-19 Tracer Software in Canada

Android users in Android should stay on alert for Android ransomware that poses as a mobile COVID-19 tracer software made for Canadian citizens. The collected samples are categorized to come from the CryoCaptor ransomware family which is a dangerous group…

THREAT REMOVAL

Remove Poulight Trojan From Your Computer

What Is Poulight Trojan The Poulight Trojan is a devastating malware which is designed to infect modern operating systems. It can be launched by multiple hacking groups and includes sophisticated features that can be used to infiltrate company networks. Poulight…

CYBER NEWS

Twitter Suffered a Data Breach: Billing Information Hijacked

A serious intrusion into Twitter’s servers has been reported, hackers have been able to breach and hijack the billing information used by the service. According to the available information the incident was localized in the advertising and analytics platform. Twitter…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree