Home > Martin Beltov

Author Archive: Martin Beltov - Page 25

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
Jhone Trojan image

Remove Jhone Trojan From Your PC

What is Jhone? How to remove Jhone Trojan from your PC or Mac? The Jhone Trojan is a dangerous Trojan that takes advantage of multiple cloud infrastructure to operate. It is being launched in a targeted attack campaign against targets…

THREAT REMOVAL
EFS Ransomware virus remove

EFS Virus (EFS Ransomware Files) Removal Guide

The EFS Ransomware is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.NEWS-virus-file-dharma-ransomware-note-stf

.NEWS Virus File (Dharma Ransomware) – Remove It

The .NEWS files virus is a ransomware from the Crysis/Dharma family. It is extremely dangerous ransomware due to the fact that it encrypts personal files located on the local drives as well as shared network directories. The primary goal of…

THREAT REMOVAL
.al1b1nal1 Virus virus remove

al1b1nal1 Virus (.al1b1nal1 File) Removal and Recovery Guide

The .al1b1nal1 virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.Nemty_-DECRYPT-txt-.Nemty_-project-ransomware-virus-ransom-note

Zeppelin Buran Virus (Buran Ransomware) – How to Remove It

What is ransomware? How does work? How to open files? How to remove and try to restore files, encrypted by it? The virus is actually Buran ransomware infection, whose main idea is to make sure that you won’t be able…

CYBER NEWS

Large List of Hijacked IoT Data Leaked On The Internet

An unknown criminal or hacking group has leaked a very large list of Telnet credentials from IoT devices. They are mostly from consumer and commonly used networking hardware — routers, servers, access points and etc. The list was posted on…

THREAT REMOVAL
stf-search.lilo.org-redirect

Remove search.lilo.org Redirect From Your Computer

search.lilo.org redirect is showing up in your browser programs? search.lilo.org is a suspicious domain because of the page redirects that can happen in your browser programs. search.lilo.org can push various full page advertisements and redirects. A single browser session could…

THREAT REMOVAL
.Z9-virus

Z9 Virus (.Z9 File) Removal and Recovery Guide

The .Z9 files virus is a ransomware from the Crysis/Dharma family. It is extremely dangerous ransomware due to the fact that it encrypts personal files located on the local drives as well as shared network directories. The primary goal of…

THREAT REMOVAL
.rams1 Virus virus remove

rams1 Virus (.rams1 File) Removal and Recovery Guide

The .rams1 virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.5ss5c Virus virus remove

5ss5c Virus (.5ss5c File) Removal and Recovery Guide

The .5ss5c virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.ADHUBLLKA Virus virus remove

ADHUBLLKA Virus (.ADHUBLLKA File) Removal and Recovery Guide

The .ADHUBLLKA virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.sivo Virus virus remove

sivo Virus (.sivo File) Removal and Recovery Guide

The .sivo virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

CYBER NEWS

CVE-2020-0601: Windows 10 Vulnerability Allows Malware to Mask as Legitimate Apps

A dangerous Windows 10 vulnerability tracked in CVE-2020-0601 has been reported by the American National Security Agency which are rated as critical. They are being tracked in the CVE-2020-0601 advisory and allows malicious code to be masked as legitimate apps…

THREAT REMOVAL
.hj36M Virus virus remove

hj36M Virus (.hj36M File) Removal and Recovery Guide

The .hj36M virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.jenkins Virus virus remove

Jenkins Virus (.jenkins File) Removal and Recovery Guide

The .jenkins virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
Saigon Trojan image

Remove Saigon Trojan From Your PC

What is Saigon? How to remove Saigon Trojan from your PC or Mac? The Saigon Trojan is a banking Trojan which is based on the popular Ursnif malware. It is being launched in a small-sized and carefully targeted attack campaign.…

THREAT REMOVAL
PowerTrick Trojan image

Remove PowerTrick Trojan From Your PC

What is PowerTrick? How to remove PowerTrick Trojan from your PC or Mac? The PowerTrick Trojan is a backdoor that is deployed by the TrickBot Trojan which aims to hijack sensitive information, manipulate infected computers and be used for various…

HOW TO

My Site Has been Hacked & Has Malware — What To Do?

Computer sites are being hacked every day and the consequences of such actions can be devastating. From removing whole sections of the sites, to virus infections and the theft of sensitive data found therein. However in many cases the intrusions…

CYBER NEWS

Iranian Hacker Groups and Their Tactics: How They Intrude Into Our Computers

Regarding the recent assassination of the Iranian general Soleimani, many security experts and users have turned their attention onto the prospective Iran or Iran-related hacking groups. The country is known to have a lot of experienced computer experts, including malicious…

THREAT REMOVAL
Pashka Virus

Pashka Virus (.pashka File) Removal and Recovery Guide

This article is made to show you just how to get rid of Pashka Virus as well as how to try and also obtain your data to function. Ransomware infections like the Pashka virus are very dangerous to computers as…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree