A 22-year-old flaw in the popular SQLite database library has been reported. The SQLite database library has a critical flaw that might be exploited by malicious actors to crash or take control of affected applications. The flaw was introduced as...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Cyber Security Weekly Recap (17-21 Oct.)
Cybercriminals related to Black Basta Ransomware are using Qakbot to Deploy Brute Ratel C4 Black Basta threat actors have been seen employing the Qakbot trojan to drop the Brute Ratel C4 framework as a second-stage payload in recent security attacks...
Cyber Security Weekly Recap (10-14 Oct.)
Intel has confirmed a leak of Alder Lake BIOS Source Code Confidential source code for Intel’s Alder Lake processors was leaked on 4chan and GitHub by an anonymous user. Alder Lake is the company’s twelfth generation of CPUs and was first...
Cyber Security Weekly Recap (3-9 Oct.)
Cyber Security Weekly Recap (3-9 Oct.) A Dell driver flaw has been exploited by hackers to install a rootkit on targeted computers. The Lazarus Group, an organization allegedly funded by North Korea, has been caught distributing a Windows rootkit by...
EvilProxy phishing service allowing hackers bypass 2-Factor Authentication
A new phishing toolset, called EvilProxy, was spotted by security researchers at Resecurity. In a blog post published on Monday, the professionals warned that EvilProxy attackers are exploiting reverse proxy and cookie injection techniques to...
CISA update adds ten new commonly exploited vulnerabilities
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities (KEV) Catalog with ten new vulnerabilities. The update, which was published on Friday, includes a critical issue in Delta Electronics’...
Hackers exploit Zero-day bug to steal from General Bytes Bitcoin ATMs
The General Bytes ATMs General Bytes, a manufacturer of Bitcoin ATMs, has admitted that it has become a target of a hack that stole money from users by exploiting a vulnerability in the company’s software. An alert issued by General Bytes last...
New Orchard Botnet Generates Malicious Domains Using Satoshi Nakamoto’s...
The Orchard Botnet Researchers from Qihoo 360’s Netlab security team have spotted a new botnet named Orchard, that, according to them, uses Satoshi Nakamoto’s account transaction information to create domain names to hide its command-and...
The Gootkit Malware has resurfaced with updated techniques to compromise...
The Gootkit Malware The criminals behind the Gootkit access-as-a-service (AaaS) malware have reemerged with modernized methods to trick victims into giving over their personal information. The Gootkit malware In its previous tactics, Gootkit masked...
Roaming Mantis targets french Android and iPhone users
Several months after it extended its reach to target European countries, the mobile threat campaign known as Roaming Mantis has been connected to a new wave of breaches focused against French mobile phone users. Sekoia said in a report that the...