Category - News

This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.

User experience  has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.

Examples:

In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.

And the first step to that is to be constantly informed of all coming changes.

News

A VMware bug could result in a hypervisor takeover

VMWare’s Cloud Foundation, ESXi, Fusion, and Workstation platforms are vulnerable to a security flaw that might allow the hypervisor to take over in virtual environments. A patch is currently pending for some users. The heap-overflow...

News

The Thales security group attacked by Lockbit ransomware

The Lockbit ransomware gang’s website states that it has infiltrated the Thales group and offers the company around 13 days to pay ransom before exposing the data it has exfiltrated to the public. While ransomware had a busy year in 2021, the...

News

A fake Telegram app uses Purple Fox Malware to infiltrate PCs

Installers for the Telegram chat software have been compromised in order to spread the Windows-based Purple Fox backdoor. Research published by Minerva Labs reveals that the success of the attack stems from the fact that the attacker was dividing it...

News

A vulnerability in Apache Log4j has been widely exploited

A newly discovered “Log4Shell” vulnerability in Log4j is being actively exploited. As per the information that is available, the threat actors are seeking to install cryptocurrency miners, Cobalt Strike, and add infected devices into a...

News

Cybercriminals Target MikroTik Routers

The MikroTik Routers Researchers from Eclypsium have revealed that threat actors have been employing MikroTik devices as command centers for launching specialized attacks for years. The MikroTik routers seem to be a target thanks to the high number...