News, Tips, Security Lab

NCA Reveals LockBit Leader's Identity

LockBit Leader Identity Revealed, NCA Publishes More Data

On May 7, 2024, UK National Crime Agency published the detailed dossier on the LockBit ransomware group’s leader. Dmitry Khoroshev,…

Wave Browser

Wave Browser is an unwanted browser application that tries to look as a yet another Chromium-based project. Although it performs…

eBay Scams

Among the vast amount of online shopping platforms, eBay stands off as a trusted and well-known one. Such a massive…

PUA:Win32/Conduit

PUA:Win32/Conduit is a potentially unwanted application that performs suspicious activity with the browser. It changes the homepage and search engine…

Trojan:Script/Wacatac.B!ml

Trojan Wacatac is an umbrella detection for a wide range of malicious software, that shares functionality and code. In particular,…

What is AcroTray.exe Process? Analysis

AcroTray.exe

The Acrotray.exe process is one of the important components provided by Adobe Systems. This process is associated with Adobe Acrobat software and often starts automatically when the Windows operating system…

CISA Issues Alert on Active Exploitation of GitLab Vulnerability

GitHub Vulnerability Exploited in the Wild, CISA Notifies

GitLab has a critical vulnerability that affects all authentication mechanisms. Without two-factor authentication, users are at significant risk. The vulnerability is currently fixed, and users are recommended to update to…

Web Companion Unwanted Program Analysis & Removal

Adaware Web Companion

Web Companion is an unwanted program works as a web protection tool. It appears unexpectedly, after the installation of a different program, and tries to make the user pay for…

What is PUA:Win32/MyWebSearch?

PUA:Win32/MyWebSearch

PUA:Win32/MyWebSearch is a Microsoft Defender detection that refers to an unwanted browser modifier. This application adds add-ons and toolbars that in fact take control of the web browser, redirecting search…

What is Trojan:Win32/Tnega!MSR?

Trojan:Win32/Tnega!MSR

Trojan:Win32/Tnega!MSR is a malicious program that functions to deliver other malware. It uses numerous anti-detection tricks and is often distributed as mods and cheats for popular games. Such threats are…

Red Ransomware Threat Actor Description

New Red Ransomware Group Discovered

In March 2024, threat analysts detected a new ransomware group, called Red Ransomware. The group, which began its activities during the waning days of prominent groups such as Lockbit and…

PUA:Win32/Presenoker Adware Analysis & Removal

PUA:Win32/Presenoker

PUA:Win32/Presenoker is an adware designed to make money by showing intrusive advertisements and collecting data. This malware can take control of your web browser and send you to advertising pages.…

USB Shortcut Virus Removal guide

USB Shortcut Virus

USB Shortcut Virus, is a malicious program that messes up with files on the disks. It is a rather old type of threat, that targets to mischief the user, rather…

Personal data vs. Sensitive Data - Difference and Importance

Personal Data vs. Sensitive Data: What is the Difference?

Technology is increasingly important in our homes, businesses, and personal devices. As a result, we are generating more personal data than ever before. But what is personal data? How do…

Data Breach vs Data Leak

Data Breach & Data Leaks

Data leaks and Data Breaches are very similar phenomena with a slight difference in the principle of action. It was a human error in one case and, in the second,…

GuptiMiner Exploits eScan Antivirus Updates

GuptiMiner Use eScan to Spread Miners and Backdoors

A recent report by Avast researchers identified an old-timer malware called GuptiMiner. It uses the eScan antivirus update mechanism to stealthily inject backdoors and cryptocurrency mining programs into users’ computer…

New Infostealers Made with Electron

Infostealers Made With Electron On The Rise

AhnLab Security Intelligence Center (ASEC) has identified a new strain of Infostealer malware created using the Electron framework. These apps are packaged in NSIS installer format, which the attacker used…