Home > Martin Beltov

Author Archive: Martin Beltov - Page 53

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Cryptocurrency Miners Infect Thousands of PCs Via Fake Adobe Flash Update

A new large-scale campaign against computer users worldwide has been uncovered to plant cryptocurrency miners via a fake Adobe Flash Update. The security report indicates that the criminals have shifted the tactic of distributing ransomware to cryptocurrency miners using this…

CYBER NEWS

New Gandcrab 5 Strains Distributed As Ransomware-as-A-Service

GandCrab 5 ransomware strains were recently released by different hacker collectives as ransomware-as-a-service. The available research shows that the developers behind them are probably offering them in underground markets in the form of RaaS. Gandcrab 5 Ransomware Used In RaaS…

CYBER NEWS

CVE-2018-8453: Microsoft Windows Zero-Day Vulnerability Used in Attacks Worldwide

Security experts discovered a zero-day vulnerability affecting Microsoft Windows that is used by hackers to launch targeted attacks. It is being tracked in the CVE-2018-8453 advisory which describes it as a weakness in a Win32 Driver file. Microsoft has addressed…

THREAT REMOVAL

Remove .garrantydecrypt Ransomware – Restore Data

This article will aid you to remove .garrantydecrypt Ransomware. Follow the ransomware removal instructions provided at the end of the article. .garrantydecrypt Files Virus is one that encrypts your data and demands money as a ransom to get it restored.…

THREAT REMOVAL

Remove RotorCrypt Virus – Restore .!@#$%^&-()_+.1C Files

This article will aid you remove RotorCrypt Ransomware effectively. Follow the removal instructions at the end. Security reports indicate a new release of the RotorCrypt ransomware family encrypting target data with the .!@#$%^&-()_+.1C extension. Like previous versions it has an…

THREAT REMOVAL
OSX/KitM.A

OSX/KitM.A Mac Malware Removal — Mac Restore Instructions

This article has been created in order to give you insight on how to quickly remove the OSX/KitM.A Mac Malware from your Mac effectively. The OSX/KitM.A Mac Malware is a very dangerous threat to all Mac computers as it can…

THREAT REMOVAL

MacItHappen Mac PUP Removal — How To Restore Your Mac

This article has been created in order to give you insight on how to quickly remove the MacItHappen Mac PUP from your Mac effectively. MacItHappen Mac PUP is a dangerous malware that targets web browsers installed on Mac computers. Infections…

CYBER NEWS
Google Chrome image

The next Google Chrome Update May Break Your Site

The upcoming version of the Google Chrome web browser will include a new security check labelling old security certificates as non-trusted. This poses a serious issue as many of the top 1 million sites are still using them. Many of…

CYBER NEWS

Consumer Version of Google+ Will Be Shut down After User Data Leak

Following a recent announcement about exposure of sensitive user data Google has decided to shut down the Google+ service and bring changes to the user controls. The issue was discovered in their API which allowed apps to access data that…

THREAT REMOVAL

Facebook Private Video Virus Removal Instructions

This article has been created in order to explain to you what is the Facebook Private Video Virus scam and how you can remove the scamming message and the potentially unwanted program that is causing it on your PC. Facebook…

CYBER NEWS

CVE-2018-14847: MikroTik Routers Vulnerability Now Rated Critical

A new hacking technique has been found affecting MikroTik routers and making use of the CVE-2018-14847 bug. The new findings shows that the bug needs to be reassigned to a critical level. Our article gives an overview of the problem.…

CYBER NEWS

CVE-2018-16593: Critical Sony Bravia TV Vulnerabilities Discovered

A dangerous Sony Bravia TV vulnerability has been found to affect several of the popular models of the range. The security researchers that alerted of the issue note that a series of other bugs were found as well. Our articles…

THREAT REMOVAL

Customer Service Survey Scam Removal Instructions

This article has been created in order to explain to you what is the Customer Service Survey Scam scam and how you can remove the scamming message and the potentially unwanted program that is causing it on your PC. The…

THREAT REMOVAL
MacCouponFinder Ads Removal — How To Restore Your Mac

MacCouponFinder Ads Removal — How To Restore Your Mac

This article has been created in order to give you insight on how to quickly remove the MacCouponFinder Ads from your Mac effectively. MacCouponFinder Ads is a dangerous instance that targets web browsers installed on Mac computers. Infections with it…

THREAT REMOVAL

Remove Obtenez Email Redirect and Restore Your Browser

The article will help you to remove Obtenez Email fully. Follow the browser hijacker removal instructions given at the end of the article. Obtenez Email is the main page that will show up when you open a new tab page…

CYBER NEWS

Lazarus Hackers Abuse FASTCASH Scheme Against Banks Worldwide

The FASTCASH scheme is a dangerous ATM cash-out scheme that is being used by the Lazarus hackers group. This criminal collective is prolific at launching advanced attack campaigns against high-profile targets. Our article sums up their latest attacks which extracts…

CYBER NEWS

Mac OS Bug Allows Hackers to Hijack Installed Software

A new dangerous Mac OS bug has been exposed which allows hackers to hijack installed applications via an unusual route. This flaw is largely unknown to almost all Mac users and even administrators. A Largely Unknown Mac OS Bug Allows…

CYBER NEWS

Apt38 Hackers Steal Over $1.1 Billion from Banks in Its New Attack

A new security report reveals that the APT38 hackers have started a new worldwide attack against financial institutions, as a result of this millions of dollars have been hijacked from financial institutions. It is estimated that the criminal collective has…

CYBER NEWS

CVE-2018-15702: TP-LINK TL-WR841N Router Vulnerability Found

A security researcher has discovered a critical TP-LINK TL-WR841N Router Vulnerability which affects all device owners. The bug is a collection of three issues that all can be exploited by hackers as presented in the demonstrated proof-of-concept code. At this…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree