News, Tips, Security Lab

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted in April 2024. Upon detecting the suspicious activity, the organization…

RegAsm.exe

The RegAsm.exe process is an important component of the Windows operating system associated with the .NET Framework. This utility is…

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing personal information from victims worldwide. This service specialized in creating…

Virus:Win32/Expiro

Virus:Win32/Expiro is a detection of Microsoft Defender that refers to a malware with backdoor capabilities. It allows attackers to control…

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a new campaign of attackers targeting mass account compromise. Specialists have…

Script-Based Malware

Script-Based Malware

Over the last four years, the share of script-based attacks of malware offenses worldwide has grown so drastically that it raised alerts among security specialists and ordinary users. In this…

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in their PAN-OS, that leads to command injection. Residing in their GlobalProtect feature, and requiring some specific configurations, this flaw still…

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a range of websites with .gov, .mil, and edu. They commonly pose as PDF files, enriched with keywords that boost their…

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of its TVs. These vulnerabilities were found back in 2023, and could allow malicious actors to gain control of affected LG…

Avoid Answering Calls from These Area Codes: Dangerous List of Scammer Phone Numbers 2022

List of Scammer Phone Numbers 2024

Telephones have long been integral to everyday life, and scammers couldn’t help but take advantage of them. Although making random calls is as old as the world, sometimes the calls…

What is Stopabit Virus? Threat Analysis & Uninstall

Stopabit Virus

Stopabit is an unwanted application that can steal sensitive data. One of its primary functions involves browser hijacking, enabling it to intercept and collect sensitive input data, focusing on capturing…

Account restrictions are preventing this user from signing in - Problem Solved

“Account restrictions are preventing this user from signing in”

When working with Windows, users may sometimes encounter the “Account restrictions are preventing this user from signing in” error. This problem can cause significant inconvenience, up to complete inability to…

What is SMApps?

SMApps Virus

SMApps is a malicious program that aims at spreading illegal promotions. It mainly attacks browsers by changing settings and redirecting search queries from Google to suspicious sites. Possible distribution methods…

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware family that appeared on April 5, 2024. This malware aims at encrypting the files and asking a ransom payment for…

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have been detected in its Pixel smartphones. The patch is already available, as Google claimed fixing the flaws in the recent…

What is Trojan:Win32/Casdet!rfn detection?

Trojan:Win32/Casdet!rfn

Trojan:Win32/Casdet!rfn is a detection that indicates the possible presence of malware on your system. Users may encounter this detection after using pirated software or opening suspicious email attachments. In certain…

Flowmon Critical Vulnerability Threatens Network Infrastructure

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to be vulnerable to arbitrary command injection. Successful exploitation of the flaw can grant adversaries with full access to the network…