VMWare’s Cloud Foundation, ESXi, Fusion, and Workstation platforms are vulnerable to a security flaw that might allow the hypervisor to take over in virtual environments. A patch is currently pending for some users. The heap-overflow...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
The Thales security group attacked by Lockbit ransomware
The Lockbit ransomware gang’s website states that it has infiltrated the Thales group and offers the company around 13 days to pay ransom before exposing the data it has exfiltrated to the public. While ransomware had a busy year in 2021, the...
A fake Telegram app uses Purple Fox Malware to infiltrate PCs
Installers for the Telegram chat software have been compromised in order to spread the Windows-based Purple Fox backdoor. Research published by Minerva Labs reveals that the success of the attack stems from the fact that the attacker was dividing it...
Data Wiping Attacks Targeted at HP Enterprise Servers by New iLOBleed Rootkit
The iLOBleed Rootkit Hewlett-Packard Enterprise’s Integrated Lights-Out (iLO) server management technology has been targeted with a previously unknown rootkit that aims at deleting data from infected machines and messing with firmware modules...
Crypto malware found in pirated downloads of “Spider-Man: No Way Home” movie
New chances for cyberthieves to find easy victims are emerging as more of us use the internet for business or entertainment. In a report posted on 23rd of December, the researchers from ReasonLabs are noting that “Spiderman: No Way Home” gives a...
An old bug in Microsoft’s Azure App Service exposed hundreds of Source...
The Azure App Service Microsoft has addressed a security hole in its Azure App Service that has been exposing the source code of customer apps built in Java, Node, PHP and Python since September 2017. The tech giant was alerted about the...
A New Joker Malware App Has Been Downloaded by More than 500,000 Android Users
The Joker Malware on Android More than half a million people have downloaded a malicious Android app from the Google Play store that secretly sends users’ contact details to an attacker-controlled server and registers them up for unwanted paid...
As third Log4j vulnerability emerges, hackers get advantage of the second flaw
Following the revelations of an actively exploited Log4j vulnerability from the beginning of this week, there has been an uptick in the number of attacks targeting unpatched systems. What is more, according to Cloudflare, threat actors are...
A vulnerability in Apache Log4j has been widely exploited
A newly discovered “Log4Shell” vulnerability in Log4j is being actively exploited. As per the information that is available, the threat actors are seeking to install cryptocurrency miners, Cobalt Strike, and add infected devices into a...
Cybercriminals Target MikroTik Routers
The MikroTik Routers Researchers from Eclypsium have revealed that threat actors have been employing MikroTik devices as command centers for launching specialized attacks for years. The MikroTik routers seem to be a target thanks to the high number...