The Lockbit 3.0 After releasing version Lockbit 3.0 of their ransomware, LockBit operators have launched a bug reward scheme, promising to compensate anyone who discovers vulnerabilities on their website for leaks and in their code. The Bug Bounty...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Attackers Can Now Create Malicious Windows Shortcuts Thanks to the New...
The Quantum Lnk Builder Criminals now have easy access to the ability to generate malicious Windows shortcut (.LNK) files thanks to a brand new malware application that is now available for purchase on cybercrime websites. The malicious application...
A 5-year-old Apple Safari vulnerability has been exploited in the wild...
The CVE-2022-22620 Vulnerability New research from Google Project Zero reveals that a vulnerability in Apple’s Safari, which was exploited in the wild earlier this year, was patched in 2013 and reintroduced in December 2016. The vulnerability...
Cloudflare was under an unprecedented DDoS attack that reached a high of 26...
Cloudflare has spotted an extraordinary distributed denial of service attack (DDoS), which reached a high of 26 million requests per second, according to a statement released by the tech giant on Tuesday. The company’s distributed denial-of-service...
Iranian hackers using new Lyceum .NET DNS Backdoor in current attacks
In recent operations aimed against the Middle East, the Iranian state-sponsored threat actor known as Lyceum has begun using a brand-new, custom.NET-based backdoor. These operations were previously monitored under the pseudonym “Lyceum”...
New malware known as Symbiote infects all running processes on Linux systems
The Symbiote Malware Researchers from BlackBerry and Intezer have discovered a new strain of Linux malware that is “nearly impossible to detect”. The danger, which has been given the codename “Symbiote”, has the potential to...
Mandiant has no proof of being LockBit 2.0’s newest victim
A well-known ransomware organization said that it had successfully hacked Mandiant cybersecurity company and is intending to publish the stolen data as a result. Monday afternoon, a Mandiant official spokesperson informed that the company is aware...
Zero-day exploit ‘Follina’ makes older Microsoft Office Versions vulnerable
The Follina Vulnerability Attackers are able to execute malicious code on targeted devices thanks to a zero-day vulnerability in the remote Word template that exists in Microsoft Office. The Japanese security company Nao Sec is the one who issued...
GoodWill Ransomware will force you to do good deeds
The GoodWill Ransomware Researchers have discovered a new ransomware strain called GoodWill that forces victims to donate money to charitable organizations and help those in need, rather than extort money from victims. The GoodWill Ransomware...
VMware ESXi servers targeted with Linux-based ransomware
Recently, a spike in malicious actors targeting VMware ESXi servers with Linux-based ransomware has been observed by security experts. ESXi is a bare-metal hypervisor used to create and operate many virtual machines (VMs) that share a single hard...