News, Tips, Security Lab
Personal Data vs. Sensitive Data: What is the Difference?
Technology is increasingly important in our homes, businesses, and personal devices. As a result, we are generating more personal data…
Data Breach & Data Leaks
Data leaks and Data Breaches are very similar phenomena with a slight difference in the principle of action. It was…
GuptiMiner Use eScan to Spread Miners and Backdoors
A recent report by Avast researchers identified an old-timer malware called GuptiMiner. It uses the eScan antivirus update mechanism to…
Infostealers Made With Electron On The Rise
AhnLab Security Intelligence Center (ASEC) has identified a new strain of Infostealer malware created using the Electron framework. These apps…
GitHub and GitLab CDNs Abused to Spread Malware
Recent research around new spreading approaches of one stealer malware family revealed a new way to abuse GitHub. Instead of…
Virus:Win32/Grenam.VA!MSR
Virus:Win32/Grenam.VA!MSR is a type of malware that can stealthily get into the system and establish remote connections. It allows attackers to access the system and remotely perform keylogging and information-gathering…
UsoClient.exe
The UsoClient.exe process is one of the system components of the Windows operating system that is part of the Update Client. This process plays an important role in automatically managing…
Broom Cleaner App (Virus Removal)
Broom Cleaner is an unwanted program that at first glance seems to be a safe tool for cleaning and optimizing your computer. However, in reality, once installed, it performs unwanted…
OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes
Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that allow attackers to exploit Kubernetes workloads for crypto mining. Five vulnerabilities allow attackers to bypass authentication and execute…
MITRE NERVE Hacked, Service Taken Offline
MITRE reports about hacker activity in their NERVE network, spotted in April 2024. Upon detecting the suspicious activity, the organization put the affected service offline and started the investigation. The…
RegAsm.exe
The RegAsm.exe process is an important component of the Windows operating system associated with the .NET Framework. This utility is designed to register .NET assemblies in the Windows registry, allowing…
LabHost Phishing Service Taken Down by Police
Authorities have seized the LabHost phishing service, accused of stealing personal information from victims worldwide. This service specialized in creating fake websites to harvest user data illegally. However, law enforcement…
Virus:Win32/Expiro
Virus:Win32/Expiro is a detection of Microsoft Defender that refers to a malware with backdoor capabilities. It allows attackers to control the compromised system, spy on it, install other malware, manipulate…
Cisco Talos Warns of a Massive Brute Force Wave
The Cisco Talos security team has released information about a new campaign of attackers targeting mass account compromise. Specialists have recorded countless login attempts to gain unauthorized access to web…
PC Accelerate
PC Accelerate is a questionable software that is presented as a useful utility designed to optimize your computer’s performance. In reality though, this software can do more harm than good.…
Virus:Win32/Floxif.H
Virus:Win32/Floxif.H is a detection of a malicious program, though not a virus as you may suppose by its name. Malware like Floxif aims at delivering and install additional malicious payloads…
HxTsr.exe – What is the HxTsr Process?
The HxTsr.exe process is a part of the Microsoft Outlook Communications component of the Windows 10/11 operating system. This process is responsible for synchronizing mail, contacts, and calendars between Outlook…