ITFunk Archives: REvil Attacks a Law Firm
The hacking group REvil attacks a law firm with a client base that includes Elton John, Robert DeNiro and Madonna…
BitPyLock: Dangers and Best Practices
BitPyLock ransomware has focused on targeting businesses over individuals via phishing campaigns Cybercriminals lean on ransomware as it is seen…
Sarwent Malware: Unmasking the Threat
A new version of Sarwent malware can open Remote Desktop Protocol ports, giving hackers hands-on access to victims' computer When…
Tycoon Ransomware: A Comprehensive Overview of the Threat
Recent reports show another ransomware going after PC's loaded with the Windows and Linux operating systems in what appears to…
ITFunk Archives: Fake Resume Email Scam
Employers and human resources departments are being victimized by a creative new scheme that involves emailing fake resumes and medical…
Covid-19 Themed Malware and Ransomware Threats
As the hysteria related to the Coronavirus pandemic begins to wind down, so does the prevalence of overall COVID-19-themed malware…
“Mass Logger” sets the new standard in the realm of key logging threats
"Mass Logger," which is one of the newest keyloggers currently making the rounds in the cybersphere, is being tracked by…
AZORult Trojan: What is it and how to Protect from it?
The infamous AZORult trojan is using a fake ProtonVPN installer to dupe victims into installing malicious software AZORult malware specialized…
A23-trk.xyz: Unveiling the Dangers Posed by the Suspicious Domain
A23-trk.xyz is a Suspicious Domain Associated with Adware Programs and Other PUPs A23-trk.xyz is a suspicious domain that has been…
Dealing with the WWZA Variant of the STOP/Djvu Ransomware Group
WWZA Ransomware Joins the STOP/Djvu Ransomware Family WWZA Ransomware is yet another malware strain that is a part of the…