Home > Martin Beltov

Author Archive: Martin Beltov - Page 55

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Hackers Steal $60M from the Tech Bureau Cryptocurrency Exchange

Tech Bureau which is a well-known Japanese cryptocurrency exchange has been hacked by criminals. The results of infiltration is a theft of $60M worth of digital assets. This is a e yet another report of a successful operation against such…

CYBER NEWS

Custom Sustes Malware Infects Linux and IoT Servers Worldwide

The Sustes malware is a custom virus that was recently discovered in a global infection. It infects via a unique mechanism and is designed to load a cryptocurrency miner infection onto the target systems. At the moment the made impact…

THREAT REMOVAL

Remove PrivateMacDeal Mac Malware — Restore Instructions

This article has been created in order to give you insight on how to quickly remove the PrivateMacDeal Mac malware from your Mac effectively. PrivateMacDeal Mac malware is a dangerous instance that targets web browsers installed on Mac computers. Infections…

CYBER NEWS

CVE-2018-17144: Bitcoin Core Vulnerability Could Have Crashed the Network

The Bitcoin Core software has been patched to fix a critical vulnerability that could have crashed the network. The changelog and statement released by the development team shows that the problem lies in the possibility for a DoS (denial-of-service) attack.…

CYBER NEWS

Magecart Hackers Stole Customers Payment Card Data from Newegg

The infamous criminal collective known as Magecart has successfully infiltrated the Newegg site and stole the stored payment card details stored by the company’s customers. This is a critical breach into the online merchant’s systems as the criminals were able…

THREAT REMOVAL

Remove Matrix Ransomware – Restore .CHE808 Files

A new Matrix ransomware strain has been identified in an ongoing attack processing files with the .CHE808 or .CHE80 extension. Its modular framework allows the hackers to create custom threats against specific targets. We anticipate that newer versions will be…

THREAT REMOVAL

.gamma CrySiS Ransomware – Remove + Restore Files

Security researchers have detected a new iteration of the CrySiS Ransomware which processes victim files with the .gamma extension. This new version follows the well-known behavior patterns and can cause many dangers to the infected hosts. It is based on…

THREAT REMOVAL

Remove Rektware Ransomware – Restore Encrypted Data

The Rektware ransomware is a new virus threat that is currently being developed by a an unknown hacker or criminal collective. Unlike other ransomware it will add a randomly-named extension to the victim files. We suspect that future updates will…

THREAT REMOVAL

Remove ViroBotnet Ransomware and Restore .enc Files

ViroBotnet ransomware is a new ransomware that modifies the target systems and encrypts user data with a strong algorithm, the resulting files will be marked with the .enc extension. At the moment the captured samples are an intermediate release, we…

CYBER NEWS

2 Billion Bluetooth Devices Still Affected by the Blueborne Vulnerability

Following last year’s disclosure of the BlueBorne vulnerability security experts note that about 2 billion Bluetooth devices are still affected by it. BlueBorne is a collection of bugs that allow the hackers to intrude into them. Many of these devices…

THREAT REMOVAL

Remove BondUpdater Trojan — Restore Your Computer From Infections

The BondUpdater Trojan is a dangerous weapon used against high-profile targets utilizing an unique infection mechanism. It is believed that the criminals behind it are highly experienced and are connected to a state-sponsored actor. Our article gives an overview of…

CYBER NEWS

Cold Boot Attack from 2008 Still Affects PCs and Macs

Computer criminals are constantly looking our for ways to infect computer systems at large. A recent security audit has revealed that hackers are using a 2008 cold boot attack which is still found in modern computers from all major vendors.…

THREAT REMOVAL

Remove Matrix Ransomware and Restore .ITLOCK Files

Security reports indicate that a new iteration of the Matrix ransomware has been identified processing the victim files with the .ITLOCK extension. Our article provides an overview of the virus operations and it also may be helpful in attempting to…

THREAT REMOVAL

CobInt Trojan Removal Instructions — Restore Your Computer From Infections

The CobInt Trojan is a newly devised malware that has been identified in several ongoing attacks. It is an upgraded version of a previous weapon that has the potential of infecting whole networks of computers. A dangerous characteristic of it…

CYBER NEWS

Whiplr Messenger Places Uses at Risk with Insecure Account Verification

The Whiplr messenger has been found to utilize an insecure account verification procedure by requesting plain-text usernames and password combinations. This allows malicious users to easily hijack the information using various methods. The Whiplr Messenger Uses an Insecure Account Verification…

CYBER NEWS

Veeam Leaked Over 200 GB of Customer Data, Fortune 500 Companies Affected

A database belonging to Veeam, a data management company, has been leaked online containing sensitive customer records. A deeper look into its contents reveals that many of its customers are Fortune 500 companies which signals a very serious security risk.…

CYBER NEWS
Windows virus

WordPress Site Owners Targeted by Global Phishing Scam

A recent report indicates that WordPress site administrators are becoming target to a global phishing scam. It is being orchestrated by an unknown criminal collective, its main goal seems to be the acquisition of sensitive information by coercing the targets…

CYBER NEWS

PowerPool Hackers Exploit Newly Identified Windows Zero-Day Vulnerability

A new Microsoft Windows zero-day vulnerability known as ALPC LPE has been exploited in the wild. The dangerous fact is that the hacking attacks happened soon after the information was published online. Users from all over the world are affected.…

CYBER NEWS

Latest Luckymouse Trojan Set Against Government Institutions

Security experts report that the LuckyMouse Hacking group has devised a new malicious threat which uses a highly advanced infiltration behavior pattern. This new LuckyMouse Trojan has the capability to infect high-profile networks and is considered a critical infection. Luckymouse…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree