Home > Martin Beltov

Author Archive: Martin Beltov - Page 58

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Instagram Users Face Login Issues, Large-Scale Hacking Attack Suspected

Security reports indicate that Instagram users experience serious login issues which is probably caused by a worldwide hacking attack. The reason for this is a continued wave of apparent account takeovers of insecure accounts in a seemingly automated manner. This…

CYBER NEWS

APSB18-29: Adobe Releases August 2018 Security Updates

Adobe released the August 2018 Security Updates (APSB18-29)which addresses key vulnerabilities in the Acrobat and Reader applications. The released collection of updates are available both to Windows and Mac OS X users. All users running these products are advised to…

CYBER NEWS

CVE-2017-7150: Mac OS X Warning Prompts Can Be Easily Bypassed

Mac OS X computers have been found vulnerable due to a report indicating that warning prompts can be easily bypassed. A demonstration has shown how this can be used by hackers in virus infections. The vulnerability is classified as a…

CYBER NEWS

Intel Processors Affected with Foreshadow Speculative Execution Flaws

Security experts discovered three new vulnerabilities affecting Intel processors that appear to be speculative execution flaws called Foreshadow. This is the code name under which has been assigned to the bugs, appearing to be yet another problem that affects general…

CYBER NEWS

CVE-2018-8414, CVE-2018-8373 Fixed in August 2018 Patch Tuesday

Microsoft has released their latest wave of updates in the August 2018 Patch Tuesday addressing some serious vulnerabilities. Among them are issues related to the remote code execution and weaknesses exploited by popular viruses and Trojans to gain entry to…

THREAT REMOVAL

Kedi Trojan Removal — Identify and Delete Active Infections

The Kedi Trojan is a newly discovered malware that is being distributed worldwide that uses Gmail to communicate with the hacker-controlled servers. The code analysis reveals that it is a complex computer virus that can be used in many infiltration…

CYBER NEWS

Android Man-in-the-Disk Attack Can Expose Apps & User Data

Security experts discovered a new Android infection mechanism called the Man-in-the-Disk attack. It takes advantage of a design issue found to be with the operating system itself that takes advantage of the external storage access. Abuse of this possibility can…

THREAT REMOVAL
FoxRansom Virus image ransomware note .fox extension

Remove FoxRansom Virus (Hidden Tear) and Restore .fox Files

The FoxRansom Virus is a ransomware strain of the Hidden Tear family targeting primarily Hungarian-speaking computer users. The captured samples carry the initial infection commands, we presume that further updates to it may include newer components and additional instructions. Our…

THREAT REMOVAL
PooleZoor Virus image ransomware note .poolezoor extension

Remove PooleZoor Virus Infections – Restore .poolezoor Files

The PooleZoor Virus is a ransomware strain of the Hidden Tear family targeting English-speaking users on a global scale. The captured samples indicate an initial release which might be updated in the future with additional code. Our article provides an…

THREAT REMOVAL
Zoldon Virus Virus image ransomware note  Encrypted extension

Remove Zoldon Virus — Remove Active Infections and Restore Data

Zoldon virus is a newly discovered ransomware that appears to be made entirely by its operators. It does not contain code from any of the famous ransomware families. Our article provides an overview of the virus operations and it also…

THREAT REMOVAL
CMB Dharma Virus Virus image ransomware note  .cmb extension

Remove CMB Dharma Virus — Restore .cmb Files

The CMB Dharma Virus is a new test release belonging to the Dharma ransomware family. It is currently being distributed in a limited sample form. Read our in-depth removal guide to learn how to delete the infections and restore encrypted…

THREAT REMOVAL

Remove the AdKoob Malware — a Facebook Stealing Hybrid Trojan/Hjacker Virus

The AdKoob malware is a hybrid Trojan and hijacker virus which has recently been discovered in a global attack campaign. It is distributed using various methods and features many modules that are executed following the infection. Our article gives a…

CYBER NEWS

WhatsApp Vulnerability Allows Hackers to Manipulate Messages

A noteworthy WhatsApp vulnerability allows malicious users to infiltrate group chats and manipulate the messages of individual users. The hackers can take advantage of the malware method and abuse it to intercept and change contents of messages sent in private…

CYBER NEWS

Ramnit Trojan Botnet Launched, 100 000 Computers Already Infected

The Ramnit malware (also known as Virus.Ramnit.J) as one of the most dangerous banking Trojans is known for causing numerous infections worldwide. The newly discovered Black botnet has been found to be made by the same collective. Our article gives…

THREAT REMOVAL
Yourencrypter@protonmail.ch Virus image ransomware note Yourencrypter@protonmail.ch.[random ext] extension

Remove Yourencrypter@protonmail.ch Virus Infections

The Yourencrypter@protonmail.ch Virus is a new strain of the Paradise ransomware family. Our article provides an overview of the virus operations and it also may be helpful in attempting to remove the virus. Yourencrypter@protonmail.ch Virus – Distribution Ways The Yourencrypter@protonmail.ch…

CYBER NEWS

Hackers Target US Payment Processors via BGP Hijacking Attacks

Us payment processors report that they are being targeted by hackers using BGP hijacking attacks. This is a complex method used by experienced groups as it requires both resources and knowledge to execute one directly. BGP Hijacking Attacks Used Against…

THREAT REMOVAL
Koadic Trojan image

Koadic Trojan Removal — Restore Your PC From Infections

The Koadic Trojan is a dangerous Python-based RAT that can cause serious damage to infected hosts. It consists of a modular engine and plugins that add to its functionality. Read our in-depth article to learn more about it. Koadic Trojan…

CYBER NEWS

Proof-of-Concept UBoat Botnet Replicates Real-World Weapons

The UBoat botnet is a proof-of-concept botnet that has been designed primarily for penetration testing and educational purposes. The author behind it has specifically stated that the main purpose behind it is to help security engineers understand how botnets can…

CYBER NEWS

CVE-2018-5390: Vulnerability in Linux Kernel Allows for DoS Attacks

A vulnerability has been identified in the Linux Kernel (version 4.9+) which is tracked in the CVE-2018-5390 advisory. It lists several conditions that allow criminals to modify packets leading to the coordination of DoS (Denial of service) attacks. CVE-2018-5390 Advisory…

CYBER NEWS

Tech Support Scams Now Use Call Optimization Services

Computer security experts note that tech support scams are being updated to use call optimization services. Such platforms and tools are commonly used in legitimate call centers and service desks. This shows that the tech support scams continue to be…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree