The Luna Ransomware A new family of ransomware that has been given the name Luna is capable of encrypting data on devices that are running a variety of operating systems, including Windows, Linux, and ESXi. Luna ransomware appears to be specifically...
Category - News
This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.
User experience has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.
Examples:
- Hacker hide skimming code inside the favicon Metadata of E-commerce sites.
- Safari Surpasses Google Chrome with Security advantages.
- UK competition regulator claims that Google search engine deal with Apple limits competition.
In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.
And the first step to that is to be constantly informed of all coming changes.
Security patches for critical flaws in the Junos Operating System and Contrail...
Juniper Networks has distributed security patches to address a number of vulnerabilities that affect a variety of devices. Some of these vulnerabilities might be exploited by malicious actors to take control of the systems that are impacted. The...
Mantis – the most powerful botnet to date
The Mantis Botnet A record-breaking DDoS attack targeted at an undisclosed client website using Cloudflare’s Free plan was thwarted last month, which generated around 26 million requests per second, according to the company. Nearly 1,000...
The World Wide Web Consortium (W3C) has rejected Google’s and...
The Decentralized Identifiers Decentralized Identifiers have been added to the W3C’s list of web standards. It’s hard to oversee the significance of this decision in the history of the Internet. Decentralized Identifiers Syntax...
ZuoRat Malware attacks SOHO routers since 2020
Remote employees in North America and Europe have been targeted by a newly found multistage remote access Trojan (RAT) named ZuoRAT. According to the information that is revealed, the malware has been abusing SOHO routers since 2020. Lumen’s...
The LockBit ransomware group just released a Bug Bounty Program
The Lockbit 3.0 After releasing version Lockbit 3.0 of their ransomware, LockBit operators have launched a bug reward scheme, promising to compensate anyone who discovers vulnerabilities on their website for leaks and in their code. The Bug Bounty...
Attackers Can Now Create Malicious Windows Shortcuts Thanks to the New...
The Quantum Lnk Builder Criminals now have easy access to the ability to generate malicious Windows shortcut (.LNK) files thanks to a brand new malware application that is now available for purchase on cybercrime websites. The malicious application...
A 5-year-old Apple Safari vulnerability has been exploited in the wild...
The CVE-2022-22620 Vulnerability New research from Google Project Zero reveals that a vulnerability in Apple’s Safari, which was exploited in the wild earlier this year, was patched in 2013 and reintroduced in December 2016. The vulnerability...
Cloudflare was under an unprecedented DDoS attack that reached a high of 26...
Cloudflare has spotted an extraordinary distributed denial of service attack (DDoS), which reached a high of 26 million requests per second, according to a statement released by the tech giant on Tuesday. The company’s distributed denial-of-service...
Iranian hackers using new Lyceum .NET DNS Backdoor in current attacks
In recent operations aimed against the Middle East, the Iranian state-sponsored threat actor known as Lyceum has begun using a brand-new, custom.NET-based backdoor. These operations were previously monitored under the pseudonym “Lyceum”...