Beware of Heyderbit.com: Unmasking the Cryptocurrency Scam, Prevention, and Remedies
Heyderbit.com is not your typical cryptocurrency platform but a deceptive website designed to defraud unsuspecting victims by promising free crypto…
BlazeStealer Malware: Unmasking the Threat, Removal, and Prevention
BlazeStealer is a malicious program designed to steal sensitive data from devices. It poses a significant threat to your online…
Unmasking Strongprotect.co.in: A Deceptive Browser Hijacker
Strongprotect.co.in is a malicious website that employs deceptive tactics to trick users into allowing push notifications, ultimately subjecting them to…
Glupteba, the sneaky new crypto-jacking malware that is being called ‘Unstoppable’
Glupteba malware is a sneaky new malware that hackers can control remotely, and it includes a versatile range of components…
Will Latin America become the next frontier for cybercriminals
Over the past few decades, when people think of crime in South and Central America, images of drug cartels and…
Evil Corp, which was behind BitPaymer and Dridex attacks, has been blocked from deploying WastedLocker Ransomware
In previous videos, we've discussed the dangerous hacking group known as "Evil Corp" who, despite being hit with indictments from…
From the Archive: Remember when Hacktivist group Anonymous said popular Chinese app TikTok was malware?
TikTok has become a point of controversy for several reasons over the past several years, now as the app maker…
The newest variant in the Stupid ransomware family, Try2Cry, worms its way on to computers using USB Drives
A ransomware called Try2Cry is penetrating Windows computers via USB flash drives and using Windows shortcuts to pose as the…
Netwalker Ransomware takes on a research institution working on a Coronavirus Cure
A top medical research institution working on a cure for the Coronavirus paid hackers a $1.14m ransom after negotiations witnessed…
Ragnar Locker ransomware targets the Remote Management Software used by Managed Service Providers
Ragnar Locker targets software commonly used by managed service providers to prevent their attack from being detected. Hackers were first…