MacOS Backdoor Trojan in Email Spam

Malware in fake Word files MacOS backdoor malware is being distributed in malicious emails. Backdoors are ways for malware (or other unauthorized users) to get access to a computer or a network. They are difficult to detect for a normal user. This particular backdoor may arrive as an archive file (Zip) disguised as a Word … Continued

Sphinx banking trojan spreads in fake COVID-19 payment emails

Sphinx, a banking trojan that’s heavily based on Zeus/Terdot, was noticed spreading in COVID-19 themed phishing emails. Malicious emails Emails that promise COVID-19 payments are being sent to people in English-speaking countries. The emails claim to carry a form to fill out – a form that’s needed to receive a large sum of money, such … Continued

Android Banking Trojan Gets an Upgrade

What is Cerberus Here, we’re not talking about the antitheft app for Android that is also named “Cerberus”. We’re talking about a banking trojan developed for Android back in June of 2019. ThreatFabric has found that this Android malware has recently been enhanced with new tricks of a Remote Access Trojan (RAT). It can give cyber … Continued

PureLocker – what is it

PureLocker is a rare cross-OS ransomware infection and it’s evaded antivirus detection for months before being described this week, on the 12th of November, together with IMB X-Force. It’s interesting because it could be converted to work on MacOS. Portable PureLocker Like most of the ransomware viruses that we hear about, PureLocker’s operators target businesses and extort … Continued

Emotet spreads again

Emotet has started actively spreading again. Big business companies, government facilities, individuals — anyone can become a victim to this info-stealing, malware-downloading trojan. , USA, UK, Germany, Poland, and Italy have been seen targeted by this latest malicious email spam campaign that marks Emotet’s wakeup from its months-long slumber. Innocent-looking emails carry an infection Though … Continued

Rogue Application Distributed Through Search Results on Google

Rogue application considered to be a trojan virus, CrescentCore, was discovered lately. It is a dangerous computer infection targeted to infect Mac computers only.  Basically, it works as a distributor of other malware – once installed on a system, it is likely to deploy various browser extensions or applications that are generally unwanted. It was … Continued

Microsoft improves Remote Desktop Services security

Microsoft improves Windows security by releasing a patch — — for Remote Desktop Services. The vulnerability allowed people to run code on computers or servers without having logged in. Flawed Remote Desktop Services security has been responsible for many cyber attacks and hacked computers and networks. Microsoft’s patch addresses just one vulnerability which used to … Continued

Three antivirus companies hacked

Some very valuable information about the internal workings of certain antivirus companies could be for sale right now, available to cybercriminals all over the world. A Russian hacker group called Fxmsp hacked three American antivirus companies and are selling each company’s products’ source code for $150.000. Fxmsp say that they have 30 Terabytes of data … Continued

Ad fraud by apps ​installed by millions

Six apps were found to be committing fraud against advertising networks by faking clicks on ads. Google Play store removed the apps following an investigation by and , which has uncovered the fraudulent activity that was being caried out. Each of these apps had millions or tens of millions of users, a nice interface, positive … Continued

Millions of Facebook and Instagram passwords were exposed

In January of 2019 Facebook that they were storing many of their users’ passwords improperly. Facebook found that the passwords were not leaked or accessed improperly, despite the fact that thousands of Facebook employees had the ability to see the logs. Facebook said they will be notifying the people whose passwords were exposed. Millions of … Continued

Nasty List — Another Instagram phishing attack

Instagram is a social media network full of people just like us — eager to connect, share news, and experience things together. And it has a jaw-dropping 1 billion users worldwide, all connected by this giant network through which trends, news, and hoaxes flow and either fizzle out, or spark into a fire. When someone … Continued

CoinHive cryptomining services are closing down

CoinHive, the infamous in-browser crypto mining service is counting its last days, due to the massive drop in the hash rate as well as the decrease of the market value of their targeted cryptocurrency Monero (XMR) within the last year. As it was reported on the official Coinhive’s blog, after a careful consideration the company … Continued

Chrome’s new API brings an end to ad blockers

The most popular web browser Chrome is planning new changes in the near future, which already are causing a huge commotion and discontent amongst users and content creators. Even though Google claims to be making these alterations in their extension platform for security reasons mainly, most ad blockers and antivirus extensions will not be able … Continued

Hacker behind UNNAMED1989/WeChat Ransomware finally arrested

The beginning of December 2018 was a tense time in China, for both online users and cybersecurity specialists because of one really persistent and widespread threat called UNNAMED1989, or also known as WeChat ransomware. This cryptovirus managed to infect over 100k computers within then matter of a few days, demanding for 110 Chinese yuan ($16 … Continued

New complex miner threatens Linux users

Cryptomining is a considerably new malware, which still is being explored by cyber specialists and crooks, unfortunately. These silent crypto viruses make perfect threats because of the sophisticated obfuscation techniques that keep them undetectable, widespread and easy dissemination, and no need for any interaction/initiation from the infected victim. Windows users are used to warnings of new miner … Continued

Recent Posts

Security Guides

Recent Comments