Home > Martin Beltov

Author Archive: Martin Beltov - Page 37

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
.cap files virus ransomware note

.cap Files Virus (Dharma Ransomware) – Remove It

The .cap files virus is new virus threat that is derived from the Dharma ransomware family. Its main goal is to encrypt user data with a strong cipher. This gives the hackers the ability to blackmail the victims into paying…

CYBER NEWS
Malware Master134 Ad Campaign

Malware Master134 Ad Campaign Set Against Users Worldwide

Several security researchers pointed out that there is a large-scale malware Master134 Ad Campaign that is being directed against users worldwide. There is no information available about the perpetrators of the crime, it may be a highly experienced hacking group…

CYBER NEWS

Slackor RAT Allows Hackers to Use Slack Servers

The Slackor RAT is a tool developed primarily for security researchers allowing for malicious actors to use Slack as a server backend. In real-world scenarios it can also be utilized by hackers in large-scale attacks. This can be extremely dangerous…

THREAT REMOVAL
.cbs0z files virus ransom note

.Cbs0z Files Virus – How to Remove Ransomware Infections

What is .cbs0z files virus? .cbs0z files virus is also known as .Cbs0z ransomware and encrypts users’ files while asking for a ransom. The .cbs0z files virus is a new which is being actively spread against computer victims by an…

THREAT REMOVAL

KMSPico Malware – WHAT IS IT + Remove It

What is KMSPico? Is KMSPico legit or a scam? How to remove KMSPico PUP from your PC or Mac? The KMSPico Malware is a hacking tool which is advertised as an activator for Microsoft Windows and Office. It is widely…

THREAT REMOVAL
Armageddon Files Virus virus remove

Armageddon Files Virus — How to Remove It

The Armageddon File Virus is a new release of the Hidden Tear malware family which is being distributed against targets using the most popular tactics. This includes the coordination of phishing tactics such as email messages and dangerous sites. They…

THREAT REMOVAL
.vesad Files Virus virus remove

How to Remove .vesad Files Virus (STOP Version)

The .vesad files virus is a new ransomware release of the STOP family of threats. Like the previous samples it is spread to its intended trgets using the most common methods aiming to infect as many people as possible. There…

CYBER NEWS

CVE-2019-12592: Evernote Web Clipper For Chrome Flaw Allows Data Theft

The Evernote Web Clipper For Chrome extension has been identified to contain a very dangerous flaw described in the CVE-2019-12592 advisory allowing for sensitive user data to be acquired. According to the released information the cause for this vulnerability is…

CYBER NEWS

Korean WordPress Sites Targeted By Massive Spam Campaign

WordPress sites are being targeted by an unknown hacking group with a large-scale phishing attack. The security reports indicate that this is done so via a specially modeled scenario. Massive Spam Attack Hits WordPress Sites A recent security report reveals…

CYBER NEWS

CVE-2019-0708: BlueKeep Vulnerability Leveraged Against Hospitals

The BlueKeep Vulnerability which is tracked in the CVE-2019-0708 is actively used against hospitals and medical institutions. This is a dangerous flaw in the last versions of the Microsoft Windows operating system, including the embedded releases. Successful exploitation allows the…

THREAT REMOVAL
.gerosan Files Virus virus remove

.gerosan Virus File (STOP) – How to Remove + Restore Files

The .gerosan Files Virus is a release of the STOP ransomware family and as such follows the typical behavior pattern that we have seen from previous samples. It is distributed by an unknown hacking group which we believe that might…

THREAT REMOVAL

‘You Have A New Voicemail’ scam — WHAT IS IT + How to Remove

This article has been created in order to explain to you what is the The ‘You Have A New Voicemail’ Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The ‘You Have…

CYBER NEWS

CVE-2019-2725 Oracle WebLogic Server Flaw Leads To Monero Miner Infections

The CVE-2019-2725 vulnerability which is exhibited in the Oracle WebLogic Server application was abused by hackers leading to Monero miner infections. Several security reports indicate that criminal groups are taking advantage of the bug and are set onto infecting as…

CYBER NEWS

CVE-2019-12735: Linux Vim and Neovim Vulnerabilities Get You Hacked

The popular Linux editors Vim and Neovim have been found to contain a very dangerous flaw which is tracked in the CVE-2019-12735 advisory. Its exploitation allows the hackers to execute arbitrary code on the affected operating system. The Vim and…

REVIEWS

Top 10 Advanced Hacking Tools of 2019

Computer hackers are constantly searching for new ways to more easily find weaknesses in computer systems and break into them. The everlasting search for useful tools that are used by hacking groups and individual criminals will never end as utilities…

THREAT REMOVAL
.{dresdent@protonmail.com}DDT Ransomware virus remove

.{dresdent@protonmail.com}DDT Ransomware — How to Remove It

The .{dresdent@protonmail.com}DDT ransomware is a new iteration of the Globe Imposter malware family seeking to infect as many users as possible. There is no information available about the hacking collective behind it at the moment. This may mean that the…

CYBER NEWS

Microsoft Outlook Data Stolen Via Support Agent Breach

An unknown hacking group may have breached the Microsoft Outlook support agent service in a recent attack against the company. This has allowed the hackers to gain sensitive data about the users on the email platform — they were able…

CYBER NEWS

Fake Cryptohopper Trading Site Distributes Malware

An unknown hacking collective is behind a massive phishing attack that involves the creation of a fake Cryptohopper website. This is a very popular cryptocurrency trading platform which is used by thousands of users. Any interaction with any of them…

CYBER NEWS

Shopify API Vulnerability Helps Hackers Gain Sensitive Web Store Data

Ayoub Fathi, a security researcher has uncovered a dangerous Shopify API vulnerability that allows criminals to hijack a lot of sensitive information from online stores. The problem appears to lie in the API used by the system which is designed…

THREAT REMOVAL

Zombie Phish Scam — WHAT IS IT + How to Remove

This article has been created in order to explain to you what is the Zombie Phish Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The Zombie Phish Scam is a new…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree