Malware
Cyber Criminals Use IceBreaker Malware To Target Gamblers
Ice Breaker is a piece of malware written using Node.js that works like a backdoor. It was first detected in 2022 by Security Joes in campaigns targeting the gaming and gambling sectors, which were easily recognizable... Read more
Ukraine Hit by New Wiper Cyber Attack Written in Go-Lang, Dubbed "SwiftSlicer"
Ukraine has recently been the target of a new cyber offensive by Russia, which included deploying an unknown data eraser coded in Golang named SwiftSlicer. According to ESET, the attack was launched by Sandworm - a... Read more
Rhadamanthys Stealer Abuses Google Ads to Deliver Payload
Rhadamanthys, a malicious software designed to steal data such as passwords and email addresses, is now being advertised on Google ads. It is also targeting cryptocurrency wallet credentials and is being marketed as... Read more
LummaC2 Stealer Targets Windows Systems
LummaC2 is a malicious program classified as a stealer, which can be spread through various cybercriminal platforms. It is lightweight and can infect Windows systems from 7 to 11, making it easy to install. On... Read more
Bbwc Malware Could Seek Personal Data and Perform Malicious Actions on Your Computer
Bbwc malware is a type of malicious software that has been identified by researchers in the security industry for having Trojan horse capabilities. It has an ability to propagate itself through various connections and... Read more
Nosu Stealer Attempts to Grab Your Info
Nosu is a malicious program that has been classified as a stealer. It infiltrates compromised devices and steals information from them. This malware can extract usernames and passwords, personally identifiable... Read more
How To Stop and Remove HeadCrab Malware
A research team with security company Aqua Nautilus has found a dangerous and cunning malware called HeadCrab that has been infiltrating servers worldwide since late 2021. This cutting-edge threat makes use of a... Read more
Album Stealer Seeks to Compromise Facebook Accounts
Album Stealer is a type of malware that masquerades as an album of explicit photographs of women. It is spread through Facebook, where victims are tricked into downloading the malicious archive. Once extracted, they... Read more
VectorStealer Malware Can Exfiltrate Sensitive Data
VectorStealer is a type of malicious software that is used to steal sensitive data without the user's knowledge. It is classified as an information stealer and can be used to extract login details, credit card... Read more
Core Sync App Could Be Malicious
Core Sync is a component created by Adobe that helps users sync files from their computer to their Creative Cloud account. It is generally a safe application. However, cybercriminals can use it as a way to disguise... Read more
Is The Aspnet_compiler.exe Process Safe or Should You Remove It?
Aspnet_compiler.exe is a process that is used to compile Aspnet code into a format that can be run on a web server. It is not necessary to have this process running on your computer, and in fact, it can often cause... Read more
Beware! Nwjs.exe Malware Mines Crypto Using Your PC's Resources
The Nwjs.exe process is a Trojan horse that exploits the infected computer's hardware resources to mine for digital currency without the victim's knowledge or consent. By using this process name, it attempts to... Read more
Titan Stealer Malware May Compromise Your Privacy
Cyber criminals are promoting a new malware called Titan Stealer, which is based on the programming language Golang, through their Telegram channel. According to researchers Karthickkumar Kathiresan and Shilpesh... Read more
Beware of X1.c.lencr.org Malware
X1.c.lencr.org is a URL that you can run into while you browse normally and hit a bad redirect or a rogue ad, and it is often considered to be malicious due to its connections with other potentially dangerous... Read more
NeedleDropper Clipper Malware
NeedleDropper is a malicious software that is sold on hacking forums and used to inject other malware. It is a self-extracting archive containing files for executing the payloads. Cybercriminals have been observed... Read more
How To Mitigate Annoyances From Captcha Glow Virus
Captcha Glow (Captcha Glow Top) is a type of virus, also known as a browser hijacker, that infects computers or devices with internet browsers. It alters the settings of the device's web browser without permission and... Read more
Beware! Truebot Leverages Botnet Network To Seek Computer Data
Truebot, also known as Silence.Downloader, is a malicious program that has the potential to wreak havoc on computer systems around the world through botnets. Once installed, Truebot can create botnets by adding... Read more
UnrealCEFSubprocess.exe File and Process
The UnrealCEFSubProcess.exe process belongs to the software of Epic Games or Unreal Engine and is usually found in a subfolder of “C:\Program Files (x86)” such as C:\Program Files (x86)\Epic... Read more