Home > Martin Beltov

Author Archive: Martin Beltov - Page 31

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Windows Update Abused To Deliver The Stealth Falcon Malware

The Windows Update mechanisms through the Windows Background Intelligent Transfer Service (BITS) has been found to deliver the dangerous Stealth Falcon malware. This is the default any of applying updates to the Microsoft Windows operating system. A complex strategy is…

THREAT REMOVAL
GootKit Trojan image

Remove GootKit Trojan Horse

What is GootKit? How to remove GootKit Trojan from your PC or Mac? The GootKit Trojan is a dangerous malware threat which is designed mainly for Microsoft Windows computers. It can be acquired from various sources, every attack campaign can…

THREAT REMOVAL
.Barak Virus virus remove

Barak Virus (.Barak Files) — How to Remove This Phobos Ransomware

The .Barak virus is a Phobos ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the…

CYBER NEWS

Facebook Patches Critical Exploits in Its HHVM Server Software

Facebook has announced that they have updated their HHVM server software which removes the possibility of it to be exploited. The company announced that two critical bugs were fund in it. The vulnerabilities allow the hackers to obtain sensitive data…

CYBER NEWS
Domen Hacking Toolkit

Domen Hacking Toolkit Used in Worldwide Malware Campaigns

The Domen Hacking Toolkit is a dangerous weapon in the hands of numerous criminal collectives which is actively being used in global attack campaigns. It is used as a framework through which malware samples can be launched through social engineering…

THREAT REMOVAL
.biz Virus virus remove

.biz Virus (.biz Files) – Remove This Dharma Ransomware

The .biz virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.b00m Virus virus remove

b00m Virus (.b00m File) – How to Remove It

The .b00m virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.BANKS Virus virus remove

BANKS Virus (.BANKS Files) — How to Remove This Phobos Ransomware

The .BANKS virus is a Phobos ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the…

THREAT REMOVAL

Revolut Phishing Scams – How to Avoid Them

Read the article to see how you can avoid Revolut Phishing Scams and remove malware which was distributed by such scams. E-mails, messages and websites are all involved in these types of spoofing. The article will also aid you to…

THREAT REMOVAL
Message-alert.center redirect image

Remove Message-alert.center Redirect

What is Message-alert.center page? Which program causes Message-alert.center redirects? How to remove the unwanted program, causing Message-alert.center redirects from your computer? The Message-alert.center redirect is a web browser hijacker and dangerous site which are currently distributed in an active attack…

THREAT REMOVAL
.HILDA Virus virus remove

HILDA Virus (.HILDA File) – How to Remove It

The .HILDA virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

THREAT REMOVAL
.Apollon865 Virus virus remove

Apollon865 Virus (.Apollon865 File) – How to Remove It

The .Apollon865 virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the famous…

CYBER NEWS

TrickBot Updated And Used Against Mobile Carrier Users

The well-known TrickBot malware has been updated with a new version and features so that it is used by a hacking group against mobile carrier users. The new variants are confirmed to be used against users of T-Mobile, Sprint, Verizon…

CYBER NEWS

Popular WordPess Plugins Used To Hack Blogs: Update Now!

Computer researchers uncovered several popular WordPress plugins which are actively abused in order to hack sites. This is due to a weakness found in them allowing for malicious code to be injected. Since the discovery was made they have been…

CYBER NEWS

Lyceum Hackers Conduct Targeted Attacks Against The Middle East

The Lyceum hackers are a criminal group that was found to be be coordinating attacks against high-profile targets in the Middle East. The activities of the group were under investigation by security experts and released to the public. From the…

CYBER NEWS
Retadup worm

Retadup Worm Responsible for STOP Ransomware Infections Is Being Shut Down

The Retadup worm is being shut down by computer specialists, this is the malware which is responsible for the large part of the STOP ransomware versions. The worm is primarily spread in Latin America and it has an extensive malware…

CYBER NEWS

CamScanner Android App Silently Installs Necro Trojan

It appears that one of the most popular Android apps called CamScanner is installing silently the Necro Trojan on victim devices, according to a new security report. It is very possible that the developers have not done it intentionally as…

CYBER NEWS

Windows Users Be Warned, ‘Complete Hack’ Flaw Used in Attacks!

A team of security experts discovered a ‘Complete Control’ weakness in the Windows operating system which can cause a wide variety of dangerous actions. The problem lies within vulnerable that is exploited by the device drivers and operating system allowing…

THREAT REMOVAL

Remove Final Virus (.Final File) – Ransomware Instructions

What is virus . virus is also known as . ransomware and encrypts users’ files while asking for a ransom. . virus is a new malware threat that is being sent to targets across the world. It is a complex…

CYBER NEWS

Bolik Trojan Spreads To Intended Targets Via Fake VPN Sites

The Balik Trojan as a dangerous malware threat is being spread onto fake hacker-made sites, in the case of the ongoing attacks they are fake VPN sites. According to the available security reports this is done by using a sophisticated…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree