Home > Martin Beltov

Author Archive: Martin Beltov - Page 59

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

THREAT REMOVAL
DanaBot Trojan image ransomware note .paradise extension

DanaBot Trojan Removal — Restore Your PC From Infections

The DanaBot Trojan is a dangerous virus infection that specifically targets online banking users. It can cause many system modifications, spy on the users and also deploy other viruses, including ransomware. Read our complete analysis and removal guide to learn…

THREAT REMOVAL
Scarab-Turkish Virus image ransomware note  .[email] extension

Scarab-Turkish Virus (Scarab Ransomware) – Remove and Restore .[email] Files

Scarab-Turkish Virus is a Turkish variant of the Scarab ransomware family. It uses an improved encryption engine in order to encrypt sensitive user data. Read our complete Scarab-Turkish Virus removal guide to learn more about it. Scarab-Turkish Virus – Distribution…

REVIEWS

Do’s and Don’ts of the Dark Web

The Dark Web is one of the best known places where ordinary computer users can interact with the criminal underground. It can be accessed via the Tor Hidden Network via numerous relay servers found all over the world. It provides…

THREAT REMOVAL
GameOver Virus image ransomware note .gameover extension

Remove GameOver Virus – Restore .gameover Files

The GameOver Virus is a test release ransomware targeting users on a global scale. The currently released samples of it are early versions that may be updated in further iterations. Refer to our in-depth article for a technical analysis and…

THREAT REMOVAL

DocuSign Phishing Scam – How to Get Rid of it

This article has been created in order to help you by explaining to you how to remove the DocuSign Phishing Scam which can be encountered via email messages. The DocuSign phishing attack is the latest malicious tactic used to coerce…

THREAT REMOVAL

Sextortion Scam — How to Evade and Protect Yourself From It

This article has been created in order to help you by explaining to you how to remove the Sextortion Scam which can be encountered via email messages. The Sextortion scam is a new malicious tactic that is used against computer…

THREAT REMOVAL

Remove My Email Hub Redirect and Restore Your Browser

What Is My Email Hub? My Email Hub is a suspicious browser extension that can be used for browser-hijacking purposes. Interaction with it can compromise your personal details. Also note that My Email Hub may cause redirects in your browser…

THREAT REMOVAL

MusicBox Live Redirect Removal — How To Restore Your Browser

The article will help you to remove MusicBox Live fully. Follow the browser hijacker removal instructions given at the end of the article. The MusicBox Live redirect is a recently discovered browser plugin that can be used for hijacker purposes.…

THREAT REMOVAL
CryptoLite Virus image ransomware note .encrypted extension

CryptoLite Virus Removal – Restore .encrypted Files

The CryptoLite Virus is a test release ransomware targeting users on a global scale. The currently released samples of it are probably test versions that may be updated in further iterations. Refer to our in-depth article for a technical analysis…

CYBER NEWS
Google Chrome image

Google Chrome Mitigates Spectre Vulnerability Via Site Isolation

The recent rise of Spectre vulnerabilities that allows malicious code to hijack sensitive data is being addressed in the latest version Google Chrome. The latest security blog from the browser’s blog gives insight on Chrome’s ability to mitigate the issue…

CYBER NEWS

Facebook Gave Mail.Ru Extended Access to User Data

Following the latest Facebook privacy data scandal, it has been revealed that the company gave extended access to user data to 61 companies, including Mail.Ru. This is one of the biggest online services in the world used by many Russian-speaking…

CYBER NEWS

Dark Web Sales Offer Military Tech & Airport Security Information

The latest Dark Web sales that have been uncovered by experts reveal that hackers have gained access to very sensitive data. The latest reports reveal that among the sold goods there are secret military technology materials, operating manuals and even…

THREAT REMOVAL
Scarab-Recovery Virus image ransomware note .Recovery extension

Scarab-Recovery Virus (Scarab Ransomware) – Remove and Restore .Recovery Files

Scarab-Recovery Virus is a newly discovered release of the Scarab ransomware family. It is possible that future versions of it are going to feature updated code that add newer functions. Read our complete Scarab-Recovery Virus removal guide to learn more…

CYBER NEWS

Hide ‘N Seek IoT Botnet Updated with Database Infection Mechanisms

A new attack campaign utilizing updated instances of the Hide ‘N Seek IoT botnet are currently attacking users worldwide. The security analysis of the captured samples showcase that the updated code a wide range of databases servers support. This gives…

CYBER NEWS

Macy’s Customer Data Breach Exposes Credit Card Numbers, PII

Macy’s Customer data has been hijacked by hackers according to a notice posted by the company. The information posted reveals details about the security incident reveals that soon after the automated security systems detected the malicious user their accounts have…

CYBER NEWS
Spectre 1.1 Vulnerability

CVE-2018-3693: New Spectre 1.1 Vulnerability Emerges

The latest variant of the Spectre series of bugs have been discovered — the newest addition is the Spectre 1.1 vulnerability which is tracked under the CVE-2018-3693 security advisory. Like previous iterations it leverages a flaw that can create speculative…

THREAT REMOVAL
PoisonFang Virus image ransomware note encrypted extension

Remove PoisonFang Virus – Restore Encrypted Files

The PoisonFang virus is a new ransomware that contains many advanced components that can cause widespread damage on the infected hosts. The security analysis shows that it bears no code from any of the other famous families. Our article shows…

CYBER NEWS

Arch Linux AUR Repository Found to Contain Malware

The Arch Linux user-maintained software repository called AUR has been found to host malware. The discovery was made after a change in one of the package installation instructions was made. This is yet another incident that showcases that Linux users…

THREAT REMOVAL
Scarab-Bin Virus image ransomware note .bin extension

Scarab-Bin Virus (Scarab Ransomware) – Remove and Restore .bin Files

Scarab-Bin Virus is a newly discovered release of the Scarab ransomware family. It is possible that future versions of it are going to feature updated code that add newer functions. Read our complete Scarab-Bin Virus removal guide to learn more…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree