EHA

New 5ss5c Ransomware Attacks Windows Computer Encrypts Only Selected Files and Stop Database-related Services

A new ransomware strain dubbed 5ss5c encrypts only certain files and stops database-related services and processes. 5ss5c ransomware believed to be developed by threat actors behind Satan, DBGer, Lucky and Iron ransomware. The threat actors behind...

Heavily Obfuscated Malware Campaign using Weaponized PowerPoint Files to Drop Lokibot & Azorult

A new malware campaign utilizes PowerPoint files to deliver the Lokibot info stealer or Azorult remote access trojan. Security researchers from Appriver spotted the malware campaign that includes weaponized PowerPoint files. PowerPoint Malware Infection Chain The infection...
What is Malware

What is Malware? Removal and Prevention

Malware is a software or malicious code that is specifically designed for gaining access to an end-user machine or network. Attackers try to steal the data /information, damage devices and for making money by compromising...

Free BlueKeep Detection Tool to Test Your Windows Machines for Against RDP Vulnerability

BlueKeep is a remote code execution vulnerability that exists in Remote Desktop Services that allows an unauthenticated attacker to establish a connection with the targeted system. By exploiting the vulnerability attacker can install programs;...

Imminent Monitor – A RAT That Allow Hackers to Gain Full Control of the...

Researchers from Palo Alto Networks break down the illegitimate remote access tool "Imminent Monitor" that allows an attacker to gain full control of the Windows operating system and windows server. There are 65,000 samples of...

Authorities Taken Down The Hacking Tool “IM-RAT” that Gives Full Control of a Victim’s...

Authorities have taken down the Imminent Monitor Remote Access Trojan (IM-RAT) that used by cybercriminals to gain full control over the victim's computer. The investigation was lead by the Australian Federal Police (AFP) and coordinated...

More Than 12,000 Windows Users Attacked by Government-backed Hackers – Google’s Threat Analysis Group...

Google's Threat Analysis Group(TAG) has sent more than 12,000 warnings to users in 149 countries targeted by government-backed attackers. The warnings found to be sent between Jul-Sep 2019. TAG has analyzed more than 270 targeted...

New Malware Via as Google Chrome Extension & Facebook ads to Steal Credit Cards...

Malware Authors started using web browser extensions as an attack surface to distribute malware to steal credit cards and other banking details. Researchers observed a new dubbed Mispadu aimed to steal monetary details from the...

Google Chrome has Restored ‘Close Other Tabs’ & Fixed Severe Bluetooth Vulnerability

Google has released a new stable channel update chrome 78.0.3904.108 for Windows, Mac, and Linux operating systems. The release covers 5 security fixes and restored Close other tabs option. Chrome 78 removed options such as...

Debian 10.2 “buster” Released With Several Bug Fixes and Security Updates

Debian also is known as Debian GNU/Linux announced the second version of the stable Debian 10 distribution "buster", which includes patches for several security issues and Bugfixes for several problems. The Debian serves as a...