Home > Milena Dimitrova

Author Archive: Milena Dimitrova - Page 70

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

THREAT REMOVAL
Remove SmartTransaction Mac Adware

Remove SmartTransaction Mac Adware

SmartTransaction is a new form of AdLoad adware targeting macOS users. If specific requirements are met, the adware might start displaying annoying advertisements. These conditions may include incompatibility between the browser or system and the user geolocation used by the…

CYBER NEWS
Daxin backdoor

China-Linked Daxin Backdoor Shows Unseen Advanced Capabilities

Another stealthy, rootkit backdoor used for espionage has been uncovered. The malware, dubbed Daxin and Backdoor.Daxin, is capable of carrying out attacks against hardened networks, said Symantec Threat Hunter team researchers. A Look into Daxin Backdoor Daxin is described as…

CYBER NEWS
SockDetour Fileless Backdoor Targets U.S.-based Defense Contractors

SockDetour Fileless Backdoor Targets U.S.-based Defense Contractors

Security researchers detected a new advanced persistent threat campaign, which was first identified in relation to the Zoho ManageEngine ADSelfService Plus vulnerability CVE-2021-40539 and ServiceDesk Plus vulnerability CVE-2021-44077. According to Palo Alto Unit 42, the threat actors behind the campaign…

CYBER NEWS
HermeticWiper Malware Deployed in Attacks Against Ukraine

HermeticWiper Malware Deployed in Attacks Against Ukraine

A new data wiper malware has been discovered, reportedly used in attacks against machines in Ukraine, following the news of Russia launching a military operation against the country. HermeticWiper Malware Used in Attacks Against Ukraine The wiper malware has been…

CYBER NEWS
CryptBot Infostealer Distributed by Pirated Software Websites

CryptBot Infostealer Distributed by Pirated Software Websites

Another information stealer is being distributed with the help of pirated software websites. CryptBot, a well-known infostealer, has been “seen” on numerous sites that offer free downloads for cracked games and pro-grade software. CryptBot: A Constantly Evolving Infostealer Cryptbot has…

THREAT REMOVAL
External Links Tool

Remove External Links Tool Adware

What Is External Links Tool? External Links Tool is classified as an adware and a potentially unwanted application (PUA). If you have this application installed, you may be experiencing intrusive forms of advertising, as well as constant browser redirects. If…

CYBER NEWS
OpenSea smart contracts nfts-sensorstechforum

OpenSea Phishing Attack Results in Loss of $3 Million in NFTs

An NFT-related cybersecurity incident involving the OpenSea NFT marketplace took place over the weekend. Apparently, threat actors exploited a smart contract migration to deceit 17 users, resulting in a loss of nearly 3 million dollars worth of NFTs (non-fungible tokens).…

CYBER NEWS
Hive Ransomware Can Be Decrypted Using This Unique Method

Hive Ransomware Can Be Decrypted Using This Unique Method

Great news for Hive ransomware victims – security researchers found a way to decipher its encryption algorithm without using the master key. A group of academics from South Korea’s Kookmin University have shared their curious findings in a detailed report…

CYBER NEWS
CVE-2022-24087: Yet Another Critical Bug in Adobe Magento

CVE-2022-24087: Yet Another Critical Bug in Adobe Magento

CVE-2022-24087 is another critical vulnerability that Adobe had to address quickly, following the disclosure of CVE-2022-24086. CVE-2022-24087: New Critical Adobe Bug CVE-2022-24086 is a critical, zero-day security vulnerability that affected Adobe’s Commerce and Magento open-source products. The vulnerability, which has…

CYBER NEWS

NFT Security and Risks: How Secure Are Your Digital Assets?

There’s hardly anyone today who hasn’t heard about NFTs. However, how many of us do actually understand the concept of NFT? Being a cybersecurity website, we decided to have a look at the security side of the so-called non-fungible tokens.…

CYBER NEWS
Google Working on Privacy Sandbox on Android to Limit User Data Sharing

Google Working on Privacy Sandbox on Android to Limit User Data Sharing

Google recently announced “a multi-year initiative to build the Privacy Sandbox on Android”. The Goal of Privacy Sandbox on Android The goal of the initiative is introducing new, more privacy-oriented advertising solutions that will limit the sharing of user data…

THREAT REMOVAL
Remove nStart Football Browser Extension

Remove nStart Football Browser Extension

What Is nStart Football? nStart Football is a browser extension for Google Chrome. The browser extension promises to deliver sports and football news. But its sole purpose may be to alter your browser’s settings and generate advertisements. In addition, its…

THREAT REMOVAL
Remove AdjustableValue Mac Adware "Virus"

Remove AdjustableValue Mac Adware “Virus”

What Is AdjustableValue? Adware.MacOS.AdjustableValue, or simply AdjustableValue, is an adware and a potentially unwanted application targeting macOS. If you have this application downloaded onto your system, you may be experiencing various issues, such as lagging Mac performance, browser redirects and…

THREAT REMOVAL
Remove FormatProtocol Mac Adware

Remove FormatProtocol Mac Adware

What Is FormatProtocol? FormatProtocol is a recently detected adware program targeting macOS users. The program belongs to the infamous AdLoad family which has been the culprit for multiple adware-related problems for Mac users. Other examples of AdLoad include LauncherRecord and…

CYBER NEWS
New Version of MyloBot Malware Used in Sextortion Campaigns

New Version of MyloBot Malware Used in Sextortion Campaigns

A new variant of the MyloBot malware is used in sextortion campaigns. Apparently, the malware deploys malicious payloads that hackers use to send sextortion emails with demands of $2,732 in cryptocurrency. New Version of MyloBot Detected Minerva researchers recently came…

CYBER NEWS
CVE-2022-0609: Zero-Day Bug in Chrome Exploited in the Wild

CVE-2022-0609: Zero-Day Bug in Chrome Exploited in the Wild

CVE-2022-0609 is a new zero-day vulnerability in Google Chrome which has been used by threat actors in attacks. CVE-2022-0609 in Google Chrome – What Is Known? Google has already released Chrome 98.0.4758.102 for Windows, Mac, and Linux to address the…

THREAT REMOVAL
Lmonopolic.com

Remove Lmonopolic.com Redirect “Virus”

What Is Lmonopolic.com? Lmonopolic.com is a suspicious page that may try to get you to subscribe to its push notifications, with the promise to deliver the latest sports news. However, instead of receiving useful notifications, you will most likely be…

CYBER NEWS
CVE-2022-24086: Zero-Day in Adobe Commerce and Magento Platforms

CVE-2022-24086: Zero-Day in Adobe Commerce and Magento Platforms

CVE-2022-24086 is a critical, zero-day security vulnerability affecting Adobe’s Commerce and Magento open-source products. The vulnerability, which has a CVSS score of 9.8 out of 10, is actively exploited in the wild in limited attacks. Fortunately, a patch is already…

THREAT REMOVAL
remain dark browser hijacker

Remove Remain Dark Browser Extension

What Is Remain Dark? Remain Dark is a browser extension that is designed to provide a dark theme for the pages you visit. However, the extension may turn out to be suspicious, and flood you with intrusive advertisements. The extension…

CYBER NEWS
Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Threat Actors Exploit Windows Service Regsvr32 to Deliver Malware

Security researchers have been observing an increasing exploitation of regsvr32.exe, which is a Windows living-off-the-land binary, shortly known as LOLBin. Some of the analyzed malware samples belong to Qbot and Lokibot, according to Uptycs researchers. Threat Actors Abusing Regsvr32 What…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree