CobInt Trojan Removal Instructions — Restore Your Computer From Infections

The CobInt Trojan is a newly devised malware that has been identified in several ongoing attacks. It is an upgraded version of a previous weapon that has the potential of infecting whole networks of computers. A dangerous characteristic of it…Read mo… Continue reading CobInt Trojan Removal Instructions — Restore Your Computer From Infections

Whiplr Messenger Places Uses at Risk with Insecure Account Verification

The Whiplr messenger has been found to utilize an insecure account verification procedure by requesting plain-text usernames and password combinations. This allows malicious users to easily hijack the information using various methods. The Whiplr Messe… Continue reading Whiplr Messenger Places Uses at Risk with Insecure Account Verification

Veeam Leaked Over 200 GB of Customer Data, Fortune 500 Companies Affected

A database belonging to Veeam, a data management company, has been leaked online containing sensitive customer records. A deeper look into its contents reveals that many of its customers are Fortune 500 companies which signals a very serious security r… Continue reading Veeam Leaked Over 200 GB of Customer Data, Fortune 500 Companies Affected

CVE-2018-8383: Microsoft Edge and Safari Exploited via Address Bar Spoofing Vulnerability

A serious issue has been identified in the Microsoft Edge and Safari browsers as they have been found to allow address bar spoofing. This vulnerability allows malicious code to redirect the users and lead to potential virus infections. Address Bar…Re… Continue reading CVE-2018-8383: Microsoft Edge and Safari Exploited via Address Bar Spoofing Vulnerability

PowerPool Hackers Exploit Newly Identified Windows Zero-Day Vulnerability

A new Microsoft Windows zero-day vulnerability known as ALPC LPE has been exploited in the wild. The dangerous fact is that the hacking attacks happened soon after the information was published online. Users from all over the world are affected….Read… Continue reading PowerPool Hackers Exploit Newly Identified Windows Zero-Day Vulnerability

Latest Luckymouse Trojan Set Against Government Institutions

Security experts report that the LuckyMouse Hacking group has devised a new malicious threat which uses a highly advanced infiltration behavior pattern. This new LuckyMouse Trojan has the capability to infect high-profile networks and is considered a c… Continue reading Latest Luckymouse Trojan Set Against Government Institutions

Remove Dharma Virus — Restore .brrr Files

The .brrr Dharma virus samples are a recent campaign delivering a new iteration of this ransomware family. According to the security analysis they use the same behavior pattern the previous versions. Our article provides an overview of the virus operat… Continue reading Remove Dharma Virus — Restore .brrr Files

LIGMA Virus Removal – Restore Infected Computers and .CRYPTR Files

The LIGMA virus is an original ransomware that can cause irreversible damage to the infected computers. It’s modules include an advanced protective engine that can counter any security tools installed on the system. Our in-depth article shows how… Continue reading LIGMA Virus Removal – Restore Infected Computers and .CRYPTR Files

Remove OPdailyallowance Virus (Hidden Tear) and Restore .CRYPTR Files

The OPdailyallowance Virus is a ransomware strain of the Hidden Tear family targeting computer users worldwide. The captured samples carry the initial infection commands, we presume that further updates to it may include newer components and additional… Continue reading Remove OPdailyallowance Virus (Hidden Tear) and Restore .CRYPTR Files

Remove OPdailyallowance Virus (Hidden Tear) and Restore .CRYPTR Files

The OPdailyallowance Virus is a ransomware strain of the Hidden Tear family targeting computer users worldwide. The captured samples carry the initial infection commands, we presume that further updates to it may include newer components and additional… Continue reading Remove OPdailyallowance Virus (Hidden Tear) and Restore .CRYPTR Files