Home > Martin Beltov

Author Archive: Martin Beltov - Page 54

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL

Remove Matrix Ransomware and Restore .EMAN Files

This article will aid you remove Matrix Ransomware effectively. Follow the removal instructions at the end. The .EMAN Matrix Ransomware is the newest strain associated with the Matrix family of malware. Like previous versions it has an extensive list of…

CYBER NEWS

CVE-2018-17780: Telegram Bug Found to Leak IP Addresses During Calls

A new Telegram bug has been recently discovered which leaks the public IP addresses of the callers. It appears that the reason for this is a default configurations option which has been found to cause this behavior. CVE-2018-17780: Serious Telegram…

THREAT REMOVAL

Remove Appmaster Malware — Identify and Remove Active Infections

This article has been made with the main idea in mind to show you how you can remove the AppMaster Malware fake optimizer program from your PC. The Appmaster malware is a dangerous virus code that can be embedded in…

CYBER NEWS

Hackers Exploit IoT Medical Devices via Unusual Methods

The IoT medical devices have long been one of the most popular targets by computer hackers. In the past several years experts have warned both vendors and users about the vulnerabilities associated with it. Iot Medical Devices Continue to Be…

CYBER NEWS

The Torii Botnet Is A Sophisticated Hacking Weapon

The Torii botnet has been discovered in an ongoing target campaign uncovering some of its distinctive features. An analysis has been made revealing that it behaves in a very different way to other popular botnets. Torii Botnet Relies on Distinctive…

CYBER NEWS

Lojax Is the First UEFI Rootkit Used in a Cyberattack

A team of security analysts discovered a dangerous new weapon used by hackers — the Lojax UEFI rootkit which apparently is the first of it kind to be used against users. The collected information about it shows that it is…

CYBER NEWS

The VPNFILTER Trojan Has Been Updated With New Advanced Features

The VPNFILFER Trojan has been updated by the developers behind it with new modules that make it an even more dangerous threat. The detailed security analysis shows that in the hands of experienced hackers it can cause significant damage to…

CYBER NEWS

Czech Android Trojan Impersonates QRecorder App

A new Czech Android Trojan has been detected which has been found to impersonate the QRecorder app. A statement from the police shows that the hacker or group behind it has already stolen over 78 000 Euro from victim accounts.…

CYBER NEWS

All Wi-Fi Routers Found to Be Affected by Unfixable Vulnerability

Modern Wi-Fi routers have been found to be vulnerable to a dangerous vulnerability due to a technical design issue. A research team uncovered that the problem lies within the specifications of the network protocols and until changes into them are…

CYBER NEWS

Hide and Seek Iot Botnet Now Set Against Android Devices

The Hide and Seek IoT botnet has recently been updated by its creators to now target Android devices as well. The security analysis reveals that the newly released is even more dangerous than before. Our article sums up the changes…

CYBER NEWS

Mobile Sites Can Be Abused to Leak Sensitive Sensors Data

A team of security researchers has uncovered that mobile sites can be abused to leak sensitive sensors data. The report called “The Web’s Sixth Sense” reveals the privacy implications and how exactly this can be used by malicious users. Mobile…

CYBER NEWS

Mozilla Reveals User Accounts Leakage Tool Called Firefox Monitor

The Mozilla Firefox Monitor service is a new tool that will check whether the user email address has been a part of a major site leakage. It is based on “Have I Been Pwned” and seeks to bring more awareness…

CYBER NEWS

SHEIN Servers Infected by Malware, Data of 6.4M Customers Stolen

SHEIN servers were breached by hackers and as a result of the intrusion sensitive data of over 6.4 million users was hijacked. The incident occurred between June and August 2018 according to the company statement. Our article sums up the…

THREAT REMOVAL

Hurricane Florence Relief Scam Removal Instructions

This article has been created in order to explain to you what is the Hurricane Florence Relief Scam scam and how you can remove the scamming message and the potentially unwanted program that is causing it on your PC. The…

CYBER NEWS

Kodi Media Player Installations Used for Distributing Malware

A dangerous new hacking practice has been detected — the use of the of Kodi media player for distributing malware. A lot of users running the open-source software are at risk of becoming victims of a global cryptomining campaign according…

CYBER NEWS

More Than 3000 Sites’ Data Found on the Magbo Underground Market

A security research team discovered that the sensitive data belonging to numerous breached websites have been posted on sale on the Magbo underground market. This community has been found to list many of the recently hacked major online services. Our…

CYBER NEWS

The AdGuard Ad Blocker Has Been Hacked, Reset Your Passwords!

User accounts belonging belonging to the popular AdGuard ad blocker have been hacked by an unknown hacker or criminal collective. The incident has prompted the company behind it to issue a mandatory password reset on all user accounts in order…

CYBER NEWS

Hackers Steal $60M from the Tech Bureau Cryptocurrency Exchange

Tech Bureau which is a well-known Japanese cryptocurrency exchange has been hacked by criminals. The results of infiltration is a theft of $60M worth of digital assets. This is a e yet another report of a successful operation against such…

CYBER NEWS

Custom Sustes Malware Infects Linux and IoT Servers Worldwide

The Sustes malware is a custom virus that was recently discovered in a global infection. It infects via a unique mechanism and is designed to load a cryptocurrency miner infection onto the target systems. At the moment the made impact…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree