Home > Martin Beltov

Author Archive: Martin Beltov - Page 16

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Trickbot Trojan Spreads Via Fake Black Lives Matter Content

Computer criminals are using various phishing pages and other types of web content related to the Black Lives Matter protest movement and as a result deliver the Trickbot Trojan. This malware has been employed over the years as a main…

CYBER NEWS

VPN Split Tunneling May Be Risky, Consider the Odds of Being Vulnerable

VPN Split Tunneling nowadays is an option or feature that is placed in all modern services. It has grown in use midst the COVID-19 pandemic as many remote workers use them in order to access security features. However a number…

CYBER NEWS

Novel CrossTalk Attack Can Be Used To Hijack Intel CPU Data

Security researchers have published their findings about a new attack that can hijack data from Intel CPUs. This technique illustrates a new approach that can be used to hack into computers that are running the company’s processors. It is called…

CYBER NEWS

CVE-2020-1108: New .NET Core Update Addresses Critical DoS Flaw

Microsoft has released a security update in the .NET core system which fixes the CVE-2020-1108 issue detected in the framework. This was a critical problem that resulted in the ability to conduct Denial of Service (DoS) attacks which can be…

THREAT REMOVAL
Game Searcher PRO redirect image

Remove Game Searcher PRO Redirect

The Game Searcher PRO redirect is a generic threat of this malware category exhibited in both a dangerous web browser extension and a hacker-controlled site combination. It is designed into changing important web browser settings so that the victims will…

CYBER NEWS

Snake Ransomware Shut Down Honda Facilities

Honda has become the latest victim of the Snake ransomware, a particularly dangerous file encrypting virus which bestows the Ekans extension to the affected files. The hacking group who has organized the attack campaign has been able to shut down…

THREAT REMOVAL
ransom note of .AG88G virus Matrix ransomware

.AG88G Virus File (Matrix Ransomware) – Remove It

.AG88G file extension is placed on all of your files? .AG88G Virus File is also known as Matrix ransomware which locks files on a computer and demands money to be paid as a ransom for unlocking them. Matrix Ransomware (.AG88G…

THREAT REMOVAL
NetGuideSearch redirect image

Remove NetGuideSearch Browser Redirect

NetGuideSearch redirect is a malware threat designed to infect end users via dangerous browser extensions. As soon as it is installed on a given computer it will change the default settings to show hacker-controlled content. This can have a devastating…

CYBER NEWS

CV Documents Phishing Campaign Delivers Zloader Banking Trojan

An unknown hacking group is organizing a dangerous phishing campaign; infected CV files are being used as carriers of the Zloader banking Trojan. The data is placed inside Microsoft Excel which when run will install the malware and run it…

THREAT REMOVAL
Tycoon ransomware pop-up message

Tycoon Ransomware Virus Removal and Recovery Guide

The article presents detailed information about ransomware as well as a step-by-step guide on how to remove its malicious files from an infected system. You will also be presented with a how-to potentially recover encrypted files guide. Tycoon Ransomware virus…

CYBER NEWS

New USBCulrprit Malware Devised To Spy on Air-Gapped Computers

An unknown hacking group is behind a new dangerous threat which is called the USBCulprit malware. It is designed to silently infiltrate secured systems that are air-gapped — this means that they will not be connected to the external network.…

THREAT REMOVAL

Remove Naikon Trojan From Your Computer

What Is Naikon Trojan Naikon Trojan is considered an old, tested and tried malware which over the past several years has been distributed against different victims. According to the made analysis the new campaign uses a new infection approach based…

CYBER NEWS

Fake Google and Microsoft Sites Lure in Remote Company Employees

Computer hackers are utilizing a new malicious tactic attempting to trick end users into falling victims to a dangerous attack. This time the campaign is set against remote workers that work for well-known companies. The criminals are creating fake and…

THREAT REMOVAL

Remove Team9 Trojan

What Is Team9 Trojan The Team9 Trojan is an advanced malware that is believed to be created by the same hackers as those behind the infamous Trickbot virus. It contains a lot of modules that allow the remote hackers to…

THREAT REMOVAL

Remove Dupzom Trojan

What Is Dupzom Trojan The Dupzom Trojan is an effective virus tool that is being used by an unknown hacking group to attack computer devices. The identity of the criminals is not known at the moment and it is expected…

THREAT REMOVAL

Remove Maps Pro Hub Browser Redirect

The Maps Pro Hub redirect is a malware web threat that is designed to blackmail computer users into using it. It is a combination of a dangerous web browser extension and a hacker-controlled site that looks like a legitimate service.…

THREAT REMOVAL

Remove Mongo Search Browser Redirect

Mongo Search redirect is a common web infection which is hybrid redirect and browser hijacker. Hijackers are dangerous plugins made for the most popular web browsers and aim to redirect the users to a hacker-controlled page. These pages will contain…

CYBER NEWS

Octopus Scanner Malware Found in Infected GitHub Repositories

This week started with the discovery of a threat called Octopus Scanner which has been found in infected GitHub repositories. What we know is that it has been lurking on the cloud platform for several weeks now and it is…

CYBER NEWS

Ongoing Hoaxcalls Botnet Infections Carried Out By Exploits

A group of hackers is using the Hoaxcalls botnet in an ongoing infection campaign over the several months. This is a derivative threat based on the Gafgyt malware code and using several exploits targeting devices. HoaxCalls Botnet Delivered Using Dangerous…

THREAT REMOVAL

Office Depot Email Scam Removal Guide

This post has actually been made to describe what is the “Office Depot” email scan and exactly how you can remove it from your computer properly. The Office Depot email scam is a dangerous malware campaign which is operated by…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree