Home > Martin Beltov

Author Archive: Martin Beltov - Page 57

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

New Mirai Botnet Мakes Cross-Platform Infections Possible

A new Mirai botnet version has been released by computer hackers as new attacks deploying it have been detected. The attack campaigns are global and target both individual users and service devices. This is one of the most popular weapons…

THREAT REMOVAL

Mac OS X Airmail 3 Scam — Detect and Remove Infections

A recently discovered Mac OS X threat is the Airmail 3 scam which takes advantage of a software vulnerability, our guide will show users how to detect and remove active infections. Airmail 3 Scam – How Did I Get It…

THREAT REMOVAL

Turla Trojan Removal Instructions — Restore Your Computer From Infections

The Turla Trojan attacks are currently infecting users worldwide in an offensive campaign. The captured samples showcase that the threat can cause widespread damage on the compromised hosts. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL

AdvisorsBot Trojan Removal — Identify and Delete Active Infections

AdvisorsBot Trojan is a newly discovered hacking weapon which is being distributed against targets worldwide. Its modular engine allows the criminal operators to carry out complex infections utilizing a variety of modules. Our article looks at the typical samples and…

THREAT REMOVAL

YOUR APPLE DEVICE HAS A VIRUS (Apple Scam) Removal Instructions

YOUR APPLE DEVICE HAS A VIRUS (Apple Scam) is a common fake tech support scam that is being distributed in an active distribution campaigns. Various criminal collectives throughout the years have been known to use it. Our article gives victims…

THREAT REMOVAL
MyShopcoupon Mac OS X Adware Removal Instructions

MyShopcoupon Mac OS X Adware Removal Instructions

MyShopcoupon Mac OS X Adware is dangerous virus infection that can lead to many serious consequences. Typically they are acquired through interaction with hacker-controlled sites or downloading of infected files. Read our article to learn more about it and find…

THREAT REMOVAL
Xorist Virus image ransomware note .PrOtOnIs  extension

Remove Xorist Virus – Restore .PrOtOnIs Files

A new Xorist virus sample has been detected using the .PrOtOnIs extension. We have detected that it is based on the source code used by previous iterations. Our article provides an overview of the virus operations and it also may…

THREAT REMOVAL
RotorCrypt virus image ransomware note .AlfaBlock  extension

Remove RotorCrypt Virus – Restore .AlfaBlock Files

Hackers have created a new strain of the RotorCrypt virus which encrypts user data with the .AlfaBlock extension. The ongoing attack uses several methods to spread the ransomware and users all around the world are targeted.Our article provides an overview…

THREAT REMOVAL
Rapid v1 Virus image ransomware note .no_more_ransom  extension

Remove Rapid V1 Virus and Restore .no_more_ransom Files

The Rapid V1 virus has been released with a new strain that encrypts target user data with the .no_more_ransom extension. This new version shows that the criminals behind it are interested in its continued development. Our article provides an overview…

THREAT REMOVAL
BitCoinMiner remove from Mac

MacOS: BitCoinMiner-AS Malware – How to Remove It from Your Mac

The MacOS: BitCoinMiner-AS is a malware cryptocurrency miner which can infect target hosts using a variety of different methods. Infections with it can lead to the deployment of other threats and consequences upon the victims include degradation of system performance…

THREAT REMOVAL
NinjaLoc Virus image ransomware note Encrypted extension

Remove NinjaLoc Virus — Delete Active Infections and Restore Data

NinjaLoc virus is a test ransomware that appears to be made by its creators. The current attack campaign uses infected software installers to spread itself. Our article provides an overview of the virus operations and it also may be helpful…

THREAT REMOVAL

Remove My Get Daily Bible Verses Redirect and Restore Your Browser

The article will help you to remove Get Daily Bible Verses fully. Follow the browser hijacker removal instructions given at the end of the article. The Get Daily Bible Verses redirect is a browser extension that can be used for…

THREAT REMOVAL
Ryuk Virus image ransomware note Encrypted extension

Remove Ryuk Virus — Delete Active Infections and Restore Data

The Ryuk virus is a newly discovered threat that is a descendant of the Hermes ransomware family. Its modular framework allows the criminals behind it to make custom versions against specific targets. Our article provides an overview of the virus…

CYBER NEWS

Fake Fortnite Android Installers Spread Malware in Global Attack Campaign

Security experts detected that an ongoing attack campaign is spreading fake Fortnite Android games that lead to malware infections. Several outlets are being used to push the malicious apps — both third-party repositories and fake download sites. Malicious Fortnite Installers…

CYBER NEWS

Apple Hacked by a 16-year Old Hacker, Sensitive Data Stolen via the Attack

Australian media reports that a 16 year-old hacker was able to hack into Apple servers and hijack sensitive data. The report came after a police investigation and the proceeding court actions. Detailed information is not available at this moment. Apple…

CYBER NEWS

Potential BlackIT Botnet Attacks Can Bring down IoT Devices

A group of researchers presented a concept malware called the BlackIoT botnet which can be used in targeted attacks against IoT devices on a global scale. Details about the threat are available in a keynote presentation presented at a security…

CYBER NEWS

Trickbot Banking Trojan August 2018 Updated with Stealth Code Injection

The Trickbot banking Trojan has received an August 2018 update which adds a new code injection module. The infamous malware has remained active over the years as one of the most prominent Trojans used for financial crimes. The newly added…

CYBER NEWS

Necurs Botnet Campaign Targets Banks with Malware .Pub Files

The Necurs botnet is being used in a new attack campaign concentrating banks worldwide. The latest security reports indicate that the attackers utilize .PUB files which are Microsoft Publisher documents. Read our article to learn more about the incidents. Necurs…

THREAT REMOVAL
ShutUpAndDance Virus image ransomware note .ShutUpAndDance extension

Remove ShutUpAndDance Virus and Restore .ShutUpAndDance Files

The ShutUpAndDance Virus is a basic ransomware strain of the Hidden Tear family. The security analysis shows that this is the initial release of the threat, future updates are expected in coordinated attacks. Our article provides an overview of the…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree