Home > Martin Beltov

Author Archive: Martin Beltov - Page 68

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS
Octoly private data image

Octoly Marketing Service Leaked Private Data via Amazon Service

The marketing agency Octoly has erroneously exposed a lot of personal data belonging to their customers. The leak happened due to a misconfiguration in the Amazon S3 Simple Storage Service bucket which hosts the clients data. The security reports indicate…

CYBER NEWS
JenX botnet image

JenX Botnet Recruits Devices Via Grand Theft Auto Servers

Computer security experts reported the discovery of a new malware threat called the JenX Botnet which uses highly unusual distribution tactics. Instead of relying on standard email messages it abuses one of the most popular video games — Grand Theft…

CYBER NEWS
ICO security image

ICO Security: Current Threats and Trends

The ICO (initial coin offering) sales and offers are gaining popularity among investors worldwide. Advertisements, long business plans and elaborate marketing strategies are used to bring potential buyers into hundreds of platforms. However the cybersecurity risks associated with these practices…

THREAT REMOVAL

CamuBot Trojan Removal Instructions — How To Restore Infected Computers

CamuBot Trojan is a dangerous banking virus that will infect the system at a deep level. It is introduced via a sophisticated social engineering campaign and its end goals are to retrieve sensitive banking account information and private user data.…

THREAT REMOVAL

Xorist-Frozen Virus Removal

This article has been created in order to help you by explaining how to remove Xorist-Frozen Virus virus from your computer system and how to restore .DATA_IS_SAFE_YOU_NEED_TO_MAKE_THE_PAYMENT_IN_MAXIM_24_HOURS_OR_ALL_YOUR_FILES_WILL_BE_LOST_FOREVER_PLEASE_BE_REZONABLE_IS_NOT_A_JOKE_TIME_IS_LIMITED files. Security experts discovered a new virus strain derived from the Xorist ransomware…

THREAT REMOVAL

LockMe Virus – How to Remove & Restore .lockme Files

This article has been created in order to help you by explaining how to remove LockMe Virus virus from your computer system and how to restore .lockme encrypted files. The LockMe virus is a new ransomware strain that is actively…

CYBER NEWS
Smominru botnet

Smominru Botnet Infects Machines With Monero Cryptocurrency Miner

Cybersecurity analysts discovered a massive worldwide attack carrying a dangerous malware called the Smominru botnet. It is capable of manipulating the configuration of the compromised hosts and has been found to install a Monero cryptocurrency miner which takes advantage of…

THREAT REMOVAL

.enc Virus (MindLost Ransomware) — Remove and Restore Files

This article has been created in order to help you by explaining how to remove .enc files virus and how to decrypt .enc files for free. The MindLost ransomware is a newly discovered malware threat that is also known as…

CYBER NEWS
Droidclub Botnet image

Droidclub Botnet Infiltrates Machines Via Google Chrome Extensions

A new security report indicates that the newly discovered DroidClub Botnet infects targets via malware Google Chrome extensions. According to the analysis the virus has already managed to infect more than half a million users worldwide through multiple instances that…

THREAT REMOVAL
remove gl-search.com redirect effectively

Remove Gl-search.com Redirect

The gl-search.com Redirect is a malware browser hijacker that redirects the victims to a hacker-controlled page. Additional viruses can be instituted, as well as any extra components. Our in-depth gl-search.com Redirect shows how victims can effectively remove active infections and…

THREAT REMOVAL
remove home.myflightapp.com redirect effectively

Home.myflightapp.com Redirect Removal

The home.myflightapp.com Redirect is a malware browser hijacker that redirects the victims to a hacker-controlled page. Additional viruses can be instituted, as well as any extra components. Our in-depth home.myflightapp.com Redirect shows how victims can effectively remove active infections and…

CYBER NEWS

Google’s DoubleClick Network Abused to Spread Cryptocurrency Miners

Computer security experts uncovered that Google’s DoubleClick network is being used by criminals to delivery malware cryptocurrency miners. This is the company’s subsidiary that provides Internet ad services and is used by the largest agencies and publishers to deliver targeted…

THREAT REMOVAL
FedEx Parcel Scam image sensorstechforum com

FedEx Parcel Scam: How to Remove Active Infections

FedEx Parcel Scam is a phishing scam that is being spread on the Internet by unknown computer hackers. Our in-depth removal article shows you how to protect your computer against it, as well as remove existing infections. FedEx Parcel Scam…

THREAT REMOVAL

Amazon DE Phishing Scam – How to Get Rid of It?

The Amazon DE Phishing Scam is a recent malware infection that is being spread on the Internet by unknown computer hackers. Our in-depth removal article shows how to protect your computers against it, as well as remove existing infections. Amazon…

CYBER NEWS
Vermin virus image

Vermin Complex Malware and Rat Set Against Ukraine

Security analysts detected a new attack campaign that is focused on Ukraine carrying a dangerous new weapon — the Vermin malware. According to the released reports this is a heavily updated version of the Quasar Trojan that has been further…

CYBER NEWS
Hide 'N Seek IoT Botnet image

The Hide ’n Seek IoT Botnet Uses P2P to Target Devices

Security analysts uncovered a new worldwide malware threat — the Hide ‘N Seek IoT botnet which uses a custom-built P2P communication module to spread itself. The infections are rapidly increasing and it appears that separate attacks are being launched against…

CYBER NEWS
Lenovo Fingerprint Security image

Lenovo Fingerprint Security Can Be Bypassed via a Hard-Coded Password

Computer security researchers uncovered a dangerous security vulnerability in the Lenovo Fingerprint Manager Pro app. According to the reports the fingerprint security authentication can be easily bypassed by malware users by inputting a hard-coded password. Lenovo Fingerprint Manager Pro Can…

THREAT REMOVAL
i-searchresults.com image

Remove i-searchresults.com Redirect Completely

The i-searchresults.com redirect is a malware browser hijacker that redirects the victims to a hacker-controlled page. Additional viruses can be instituted, as well as any extra components. i-searchresults.com Redirect – Spread Techniques Computer security experts discovered a new browser hijacker…

THREAT REMOVAL
.RansomUserLockere virus remove decrypt data

.RansomUserLocker Virus Infection – How to Remove and Restore Files

Our in-depth removal guide shows how victims of the .RansomUserLocker virus can restore their data and computers. This is a follow-up derivative of an earlier threat and the security experts propose that future updates can also be expected. The malware…

THREAT REMOVAL
GandCrab ransomware image

GandCrab Ransomware Removal – Restore .GDCB Files

Our GandCrab ransomware removal guide shows how computer users can restore their computers from the dangerous virus. It alters important settings on the system, encrypts sensitive data with the .GDCB extension and can lead to further infections. Read our in-depth…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree