News, Tips, Security Lab
Virus Alert (05261) Scam
“Virus Alert (05261)” is a scam pop-up message you can see on a website that looks like a Microsoft page,…
Altisik Service Virus
Altisik Service is a malicious coin miner that usually installs and runs on the target system without the explicit consent…
Critical RCE Vulnerability in GiveWP WordPress Plugin
A critical vulnerability has been discovered in the GiveWP WordPress plugin that leaves thousands of websites exposed. The vulnerability is…
Movidown Unwanted Application
Movidown is an Unwanted Application that initially mimics a utility for controlling fan speed. However, beneath this shell, it has…
Google Pixel Devices Shipped with Vulnerable App
Recent research has uncovered a vulnerable app in the Android package on a whole bunch of Google Pixel smartphones. Devices…
ARP Spoofing (ARP Cache Poisoning) Attack
ARP Spoofing (also known as ARP Cache Poisoning) is a…
Phishing vs Spoofing: Definition & Differences
What is a Phishing Attack? Phishing is a cyber-attack method…
CrowdStrike Falcon Bug Causes Windows Outages Around the Globe
Bug in the recent update of the CrowdStrike Falcon caused…
How to Get Rid of Spam Emails?
Email spam is an annoying and unwanted mailing of many…
Rite Aid Hacked, Data of 2.2 Million Customers Leaked
In June 2024, Rite Aid, a US-based chain of pharmacy…
BadPack Malware for Android Parasites on APK Installers
A new research reveals a novel approach at hiding malware…
Trojan:Script/Downloader!MSR
Trojan:Script/Downloader!MSR is a malicious script that downloads other malware onto…
How to Remove a Virus From a Computer in Safe Mode
In quite a few cases, you can see advice on…
AT&T Hacked in April, All Wireless Customers Affected
AT&T, one of the US biggest network operators, confirms a…
Trojan:Win32/Bearfoos.B!ml
Trojan:Win32/Bearfoos.B!ml is a detection of Microsoft Defender associated with data…
Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited
Microsoft has released its monthly security update, addressing 142 vulnerabilities…
AsyncRAT Spreads As Fake eBook Files, Uses LNK Files
Recent research uncovers a new spreading campaign of AsyncRAT, that…