Daily Archives: May 22, 2020


Jokerlivestream.com is a website that uses shady practices to make you provide your credit card details Jokerlivestream.com is an adware program which uses stealth techniques to reach its target Jokerlivestream.com is an adware program which uses stealth techniques to reach its target Jokerlivestream.com is a video streaming site that allegedly […]

Jokerlivestream.com


EvilNum is dangerous malware that targets financial and other organizations EvilNum is a malicious piece of software designed to steal information and proliferate other malware EvilNum is a malicious piece of software designed to steal information and proliferate other malware EvilNum is a Trojan that was first discovered in 2018 […]

EvilNum


Locky is a threat known as a notorious ransomware virus because it relies on file-locking and ransom demanding for many years Locky is a seriously dangerous ransomware virus that encrypts data using RSA-2048 + AES-128 cipher with ECB[1] mode. The malware made the first appearance in February 2016, when developers sent […]

Locky virus







PUP.Optional.Sweetpacks is a potentially unwanted application that injects ads into Chrome or another web browser Sweetpacks, otherwise known as PUP.Optional.Sweetpacks, is a potentially unwanted program (PUP) developed by SweetIM. Once the standalone application is installed on the system, it will also download and append a browser toolbar, compatible with Google Chrome, Mozilla […]

Sweetpacks Toolbar


Cov19 ransomware is a dangerous threat that can lock personal files and cause its victims significant financial losses Cov19 ransomware is a dangerous file-encrypting cyber infection that is currently under an active contagion phase. Its developers misuse the name of the COVID-19 pandemic[1] that has resonated around the world in […]

Cov19 ransomware


Researchers reveal that campaigns based on “living off the land” tools, conducted by Chafer APT Hacker group with apparent links to the Iranian government released attacks based on several tools built for hacking and spreading backdoors, data exfiltration.[1] Researchers revealed that attacks in the Middle East were by the Chafer […]

Governments in Kuwait and Saudi Arabia targeted by Iranian Chafer ...