Malware

Cyber Criminals Use IceBreaker Malware To Target Gamblers screenshot

Cyber Criminals Use IceBreaker Malware To Target Gamblers

Ice Breaker is a piece of malware written using Node.js that works like a backdoor. It was first detected in 2022 by Security Joes in campaigns targeting the gaming and gambling sectors, which were easily recognizable... Read more

February 3, 2023
Ukraine Hit by New Wiper Cyber Attack Written in Go-Lang, Dubbed

Ukraine Hit by New Wiper Cyber Attack Written in Go-Lang, Dubbed "SwiftSlicer"

Ukraine has recently been the target of a new cyber offensive by Russia, which included deploying an unknown data eraser coded in Golang named SwiftSlicer. According to ESET, the attack was launched by Sandworm - a... Read more

January 30, 2023
Rhadamanthys Stealer Abuses Google Ads to Deliver Payload screenshot

Rhadamanthys Stealer Abuses Google Ads to Deliver Payload

Rhadamanthys, a malicious software designed to steal data such as passwords and email addresses, is now being advertised on Google ads. It is also targeting cryptocurrency wallet credentials and is being marketed as... Read more

January 17, 2023
LummaC2 Stealer Targets Windows Systems screenshot

LummaC2 Stealer Targets Windows Systems

LummaC2 is a malicious program classified as a stealer, which can be spread through various cybercriminal platforms. It is lightweight and can infect Windows systems from 7 to 11, making it easy to install. On... Read more

January 11, 2023
Bbwc Malware Could Seek Personal Data and Perform Malicious Actions on Your Computer screenshot

Bbwc Malware Could Seek Personal Data and Perform Malicious Actions on Your Computer

Bbwc malware is a type of malicious software that has been identified by researchers in the security industry for having Trojan horse capabilities. It has an ability to propagate itself through various connections and... Read more

December 16, 2022
Nosu Stealer Attempts to Grab Your Info screenshot

Nosu Stealer Attempts to Grab Your Info

Nosu is a malicious program that has been classified as a stealer. It infiltrates compromised devices and steals information from them. This malware can extract usernames and passwords, personally identifiable... Read more

December 9, 2022
How To Stop and Remove HeadCrab Malware screenshot

How To Stop and Remove HeadCrab Malware

A research team with security company Aqua Nautilus has found a dangerous and cunning malware called HeadCrab that has been infiltrating servers worldwide since late 2021. This cutting-edge threat makes use of a... Read more

February 2, 2023
Album Stealer Seeks to Compromise Facebook Accounts screenshot

Album Stealer Seeks to Compromise Facebook Accounts

Album Stealer is a type of malware that masquerades as an album of explicit photographs of women. It is spread through Facebook, where victims are tricked into downloading the malicious archive. Once extracted, they... Read more

January 25, 2023
VectorStealer Malware Can Exfiltrate Sensitive Data screenshot

VectorStealer Malware Can Exfiltrate Sensitive Data

VectorStealer is a type of malicious software that is used to steal sensitive data without the user's knowledge. It is classified as an information stealer and can be used to extract login details, credit card... Read more

January 16, 2023
Core Sync App Could Be Malicious screenshot

Core Sync App Could Be Malicious

Core Sync is a component created by Adobe that helps users sync files from their computer to their Creative Cloud account. It is generally a safe application. However, cybercriminals can use it as a way to disguise... Read more

December 21, 2022
Is The Aspnet_compiler.exe Process Safe or Should You Remove It? screenshot

Is The Aspnet_compiler.exe Process Safe or Should You Remove It?

Aspnet_compiler.exe is a process that is used to compile Aspnet code into a format that can be run on a web server. It is not necessary to have this process running on your computer, and in fact, it can often cause... Read more

December 15, 2022
Beware! Nwjs.exe Malware Mines Crypto Using Your PC's Resources screenshot

Beware! Nwjs.exe Malware Mines Crypto Using Your PC's Resources

The Nwjs.exe process is a Trojan horse that exploits the infected computer's hardware resources to mine for digital currency without the victim's knowledge or consent. By using this process name, it attempts to... Read more

December 8, 2022
Titan Stealer Malware May Compromise Your Privacy screenshot

Titan Stealer Malware May Compromise Your Privacy

Cyber criminals are promoting a new malware called Titan Stealer, which is based on the programming language Golang, through their Telegram channel. According to researchers Karthickkumar Kathiresan and Shilpesh... Read more

February 1, 2023
Beware of X1.c.lencr.org Malware screenshot

Beware of X1.c.lencr.org Malware

X1.c.lencr.org is a URL that you can run into while you browse normally and hit a bad redirect or a rogue ad, and it is often considered to be malicious due to its connections with other potentially dangerous... Read more

January 20, 2023

NeedleDropper Clipper Malware

NeedleDropper is a malicious software that is sold on hacking forums and used to inject other malware. It is a self-extracting archive containing files for executing the payloads. Cybercriminals have been observed... Read more

January 16, 2023
How To Mitigate Annoyances From Captcha Glow Virus screenshot

How To Mitigate Annoyances From Captcha Glow Virus

Captcha Glow (Captcha Glow Top) is a type of virus, also known as a browser hijacker, that infects computers or devices with internet browsers. It alters the settings of the device's web browser without permission and... Read more

December 21, 2022
Beware! Truebot Leverages Botnet Network To Seek Computer Data screenshot

Beware! Truebot Leverages Botnet Network To Seek Computer Data

Truebot, also known as Silence.Downloader, is a malicious program that has the potential to wreak havoc on computer systems around the world through botnets. Once installed, Truebot can create botnets by adding... Read more

December 13, 2022
UnrealCEFSubprocess.exe File and Process screenshot

UnrealCEFSubprocess.exe File and Process

The UnrealCEFSubProcess.exe process belongs to the software of Epic Games or Unreal Engine and is usually found in a subfolder of “C:\Program Files (x86)” such as C:\Program Files (x86)\Epic... Read more

December 8, 2022
Loading...