Phishing surrounding coronavirus outbreak continues – scam emails deliver a new version of Zeus Sphinx banking trojan While some cybercriminals promise to spare infecting healthcare providers with malware during a difficult time of coronavirus outbreak,[1] others are keen to use it for personal gain. Security researchers at IBM X-Force uncovered […]

Resurface of Zeus Sphinx trojan: threat actors abusing COVID-19 crisis


CyberGhost – a feature-packed VPN service that helps to prevent tracking CyberGhost VPN is one of the most reliable and privacy-focused Virtual Private Network services around. Based in Romania and Germany, this VPN client serves more than 10 million people worldwide. It provides a stable connection to more than 5,800 servers […]

CyberGhost


Taargo ransomware is the widespread malware that runs various processes in the background to affect virus termination and data recovery procedures Taargo ransomware is a cryptovirus that adds _aro.exe file, for example, that runs in the background of the device and manages to affect functions or program performance. This is […]

Taargo ransomware



Pluto TV review: an ad-supported program that causes advertising campaigns while being used for watching movies Pluto TV is represented as a legitimate online television service granting access to 75 live channels and streaming hundreds of popular movies and TV series. However, cyber security experts have doubts is Pluto TV safe […]

Pluto TV


#StayHome Tech – Private Internet Access VPN Considering how the recent COVID-19 pandemic has been evolving, people all over the world are being encouraged to #StayHome, no matter if they’re sick or not. These campaigns make people more present online and more involved in the world of cybersecurity due to malicious […]

Online safety issues during the quarantine: how to manage your ...


[[email protected]].LX ransomware is the cryptovirus that locks users’ files and may even damage them completely overtime LX ransomware is the threat that uses army-grade encryption algorithms to lock various files found on the targetted machine and then demands payments from victims. The ransom demand claims that criminals can recover encoded […]

[[email protected]].LX ransomware



Receiver Helper virus is adware app that sneaks into Mac computers unnoticed Receiver Helper is a potentially unwanted application goal of which is to install suspicious extensions on web browsers and display unwanted ads on all visited websites Receiver Helper is a potentially unwanted application goal of which is to […]

Receiver Helper virus


Mado ransomware is the infection created with the purpose of getting money directly from victims by locking their valuables   Mado ransomware – a threat that belongs to a family of notorious crypto viruses, focusing on scaring people into paying the demanded amounts. The money-driven people behind this malware are […]

Mado ransomware


Solo84.biz is the browser pop-up scam that tricks people into subscribing to nonsense push notifications Solo84.biz is the potentially unwanted program that creates tons of pop-ups and other types of material that displays promotional content or advertisements that trigger additional redirects your phone and computer to possibly malicious and dangerous […]

Solo84.biz



A data dump containing 4,934,863 Georgian voters’ personal information was found being sold on the underground forums On Saturday, security researchers from Under the Breach discovered a listing on underground hacking forums – it contained personal information of Georgian citizens. The data dump reached 1.04 GB in size and was […]

Personal data of almost 5 million Georgian voters exposed online