Home > Martin Beltov

Author Archive: Martin Beltov - Page 29

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
.skynet Virus virus remove

Skynet Virus (.skynet File) – How to Remove It From Your Computer

The .skynet virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.Adair virus remove

Adair Virus (.Adair Files) — How to Remove This Phobos Ransomware

The .Adair is a Phobos ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.James Virus virus remove

James Virus (.James File) – How to Remove It From Your Computer

The .James virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.tgmn Virus virus remove

tgmn Virus (.tgmn File) – How to Remove It From Your Computer

The .tgmn virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

CYBER NEWS

iTunes and iCloud Exploited By Hackers and Infected With Ransomware

An unknown hacking group has been found to exploit Apple’s iTunes and iCloud programs in order to deploy ransomware. This is possible by using a zero-day vulnerability which allows the criminals to implant the malicious code without alerting any installed…

THREAT REMOVAL
.PO1HG Virus virus remove

PO1HG Virus (.PO1HG File) – How to Remove It From Your Computer

The .PO1HG virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
stf-Ethdcrminer64etc.exe-cpu-miner-Trojan

Remove Ethdcrminer64etc.exe Miner Trojan Horse and Clean Your PC

Is Ethdcrminer64etc.exe a Trojan horse? Does Ethdcrminer64etc.exe harm your computer? Can Ethdcrminer64etc.exe spread to other computers over a network? Ethdcrminer64etc.exe is the name of a Trojan horse. An executable process related to the Ethdcrminer64etc.exe Trojan horse is involved in spreading…

HOW TO

Volusion Cloud Service Breached, Hackers Steal Customer Payment Card Data

Computer criminals have been able to breach the Volusion cloud-based online provider. The attack was made by an unknown hacking group and according to the reports they have been able to acquire payment card data that is stored on their…

CYBER NEWS
malware attacks image

Mustang Panda Chinese Hackers Launch Large-Scale Attacks Via Malware Documents

A dangerous new hacking collective known as Mustang Panda is leveraging macro-infected documents to target users worldwide. The large-scale campaign appears to be against both public and private sectors. At the moment there is no information available about the intentions…

CYBER NEWS

Outdated VPN Software Used For Spying on International Targets

Hacking groups have been found to use outdated VPN software and specific exploits found in them to spy on the victims. This is according to several reports from government security agencies. This is particularly dangerous as the criminal collectives can…

CYBER NEWS

Turla Hackers Release New Reductor Trojan That Reads Secure Traffic

A security team of experts have discovered a new generation of malware that is created by the Turla hacking group and is called the Reductor Trojan. According to the available research it is a successor to the already released COMpfun…

CYBER NEWS

Android Apps Can Harvest Your Data Even If You Have Denied Permissions

Android applications are constantly acquiring user data without the users knowing about this process. According to a recent study a large part part of software installed on devices running Google’s operating system can harvest sensitive data without notifying or asking…

THREAT REMOVAL
.Sapphire Virus virus remove

Sapphire Virus (.sapphire File) – How to Remove It From Your Computer

The .Sapphire virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
beeaimaid.com redirect image

Remove beeaimaid.com Redirect From Your Computer

What is beeaimaid.com page? Which program causes beeaimaid.com redirects? How to remove the unwanted program, causing beeaimaid.com redirects from your computer? The beeaimaid.com redirect is a web browser hijacker and dangerous site which are currently distributed in an active attack…

THREAT REMOVAL
Casbaneiro Trojan image

Remove Casbaneiro Trojan From Your PC

What is Casbaneiro? How to remove Casbaneiro Trojan from your PC or Mac? The Casbaneiro Trojan is a dangerous malware threat which is designed mainly for Microsoft Windows computers. It can be acquired from various sources, every attack campaign can…

THREAT REMOVAL
.aep Virus virus remove

aep Virus (.aep File) – How to Remove It From Your Computer

The .aep virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

CYBER NEWS

Geost Android Botnet Amasses 800,000 Hosts in Russia

One of the malware phenomena that is rapidly expanding is the Geost Android botnet which is reported to have gained the size of more than 800,000 hosts, most of them in Russia. The end goal of the botnet is to…

CYBER NEWS

6,000 Yahoo Email Accounts Hacked By Pervert Employee

A Yahoo employee has been found guilty of hacking the inboxes of 6,000 users of the company’s service. The engineer invaded the privacy of the users in order to look for private sexual content belonging to the users — both…

THREAT REMOVAL
.badday Virus virus remove

badday Virus (.badday File) – How to Remove It

The .badday virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree