Dismantling ZLoader Trojan by Microsoft
With court permission, Microsoft seized control of 65 domains used to control the Zloader botnet. It was possible to identify them through the joint efforts…
Windows 11 Upgrade Installs Info-Stealing Malware
Cybercriminals persuade unsuspecting users to install a fake upgrade to Windows 11, which in fact, copies malware into the system that steals data from the…
Trojan Emotet has multiplied its spam activity and started attacking 64-bit systems
Emotet bot growers continue to increase their combat potential through malicious mailings. In February, Kaspersky Lab’s security solutions blocked about 3,000 spam emails generated by…
A New REvil Site Has Appeared in the Tor Network, Linked by a Redirect to The Original
The REvil servers on the Tor network are back online and are now redirecting requests to the new leak site. Its pages contain a long…
A Category
Trojan Remover ☀️ Review 2022 — Is It Any Good?
Do you need a new security solution like Trojan Remover? You find tons of information about what to choose among antivirus solutions looking for excellent and reliable cybersecurity tools. Unfortunately, it can sometimes be hard to buy a new and good antivirus solution. You can easily get confused by the features and spend some significant…
RIG Exploit Kit Delivering RedLine Via Internet Explorer
Researchers at Bitdefender have discovered a new campaign of cybercriminals using the RIG exploit kit to distribute the famous RedLine malware, which aims to steal victims’ data and transfer it to operators. Interestingly, exploit kits like RIG, which used to be quite popular, are now increasingly fading into the shadows. And all thanks to improved…