Home > Martin Beltov

Author Archive: Martin Beltov - Page 26

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Bronze President Hackers Behind Massive Cyber Espionage Campaign

A security research group has uncovered a dangerous hacking group known as Bronze President. Apparently the criminals are responsible for an extensive cyber espionage campaign targeting networks located in Asia. They are using a combination of custom code and publicly…

CYBER NEWS

Brazilian Coybot Android Trojan Continues With Attacks

The CoyBot Android Trojan which is a well-known threat in Brazil continues with its attacks against end users The first campaigns were first detected in October 2018 and since then other campaigns have been occasionally reappeared. The latest activity has…

THREAT REMOVAL
.devil virus remove

Devil Virus (.devil Files) — How to Remove This Phobos Ransomware

The .devil is a Phobos ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.RIDIK-virus-file-dharma-ransomware-note-stf

.RIDIK Virus File (Dharma Ransomware) – Remove It

The .RIDIK files virus is a ransomware from the Crysis/Dharma family. It is extremely dangerous ransomware due to the fact that it encrypts personal files located on the local drives as well as shared network directories. The primary goal of…

THREAT REMOVAL
MZP ransom note

MZP Virus (Ransomware Infection) – How to Remove It

What is ransomware? How does work? How to open files? How to remove and try to restore files, encrypted by it? The virus is actually a ransomware infection, whose main idea is to make sure that you won’t be able…

THREAT REMOVAL
.c0hen Virus virus remove

C0hen Virus (.c0hen Files) – How to Remove It From Your Computer

The .c0hen virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
HeroRat Trojan image

Remove Lampion Trojan From Your PC

What is Lampion? How to remove Lampion Trojan from your PC or Mac? The Lampion Trojan is a banking virus which aims to hijack sensitive information, manipulate infected computers and be used for various crimes. A new attack carrying a…

THREAT REMOVAL
RedShot ransom note

RedShot Virus (Ransomware Infection) – How to Remove It

What is ransomware? How does work? How to open files? How to remove and try to restore files, encrypted by it? The virus is actually a ransomware infection, whose main idea is to make sure that you won’t be able…

CYBER NEWS

Spelevo Exploit Kit Used To Distribute Malware Via Fake Adult Sites

The Spelevo Exploit Kit as one of the dangerous weapons handled by hackers has been found to create numerous adult sites and infect them with malware automatically. The hackers will distribute the threats via organized phishing strategies. A distinctive feature…

CYBER NEWS
HTTP Injector image

Smominru Botnet Launches Miner-Infected Taylor Swift Images

The Smominru botnet which is a well-known weapon used by criminal organizations has been revealed to conduct a massive campaign with the aim of infecting the victims with cryptocurrency miners. The payload files which carry the infections are JPEG images…

THREAT REMOVAL

.TheOld Virus (God Save the Queen Ransomware) — How to Remove It

This article has been created in order to best explain what is God Save The Queen ransomware and how you can remove it from your computer. God Save The Queen Ransomware is a virus whose main idea is to enter…

CYBER NEWS

Emotet Christmas Phishing Attacks Launched Via Fake Party Menus

Emotet hackers are rapidly sending out phishing email messages with the intention of scamming the recipients into believing that they are receiving Christmas party menus. In the messages there are attached files that will lead to malware infections. Various types…

CYBER NEWS

“Gangnam Industrial Style” Attack Against Enterprise Networks Carried Out By Hackers

The “Gangnam Industrial Style” is a well-planned attack against high-profile enterprise networks, most of them located in South Korea. The reports indicate that an experienced hacking group is leveraging the intrusion attempts against industrial, engineering and manufacturing companies, as well…

THREAT REMOVAL
Red Alert 2.0 Android Trojan image sensorstechforum com

xHelper Android Trojan Ranks Among Top Malware For Smart Devices

The xHelper Android Trojan which is one of the dangerous threats has gained widespread popularity among hackers and has become among the top 10 viruses for Google’s operating system. It can hide itself from security software or the user and…

CYBER NEWS

Momentum Botnet Infects Large Number of Linux and IoT Devices

The Momentum botnet is one of the most attack entities online at the moment. This is a large network of contaminated Linux and IoT hosts that can be used for large-scale sabotage campaigns. An unknown hacking group is behind its…

CYBER NEWS

Juice Jacking Malware Charging Attacks May Lead To Serious Infections

Juice jacking is the practice of abusing publicly available USB charging ports to insert malware onto the introduced smart devices. It appears that this malicious technique can allow the hackers to deliver a wide range of dangerous malware. The end…

CYBER NEWS

Magecart Hackers Breach Fake Brand E-Commerce Sites

The infamous Magecart hacking group has been fund to be behind a large-scale attack against e-commerce sites. They have been found to replace JavaScript code into numerous sites that list counterfeit big brands products. Examples include the likes of Nike,…

THREAT REMOVAL

Remove Nbes Virus (.nbes File) – Ransomware Guide

virus is the name of a ransomware infection that infects computers with Windows systems. It is a variant of STOP ransomware that has actually been hiding across the internet for quite a long time. The key goal of this destructive…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree