Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer Moves from Pyeongchang to Europe and Russia

Olympic Destroyer, the threat actor that targeted the 2018 Winter Olympics in Pyeongchang, South Korea, has launched new attacks against organizations from Russia, Ukraine and several other European countries. To sabotage the ...
Security Boulevard
Sucuri Webinar: How to Clean a Hacked Magento Website

Magento Credit Card Stealer Reinfector

In the past few months, we have frequently seen how attackers are infecting Magento installations to scrape confidential information such as credit cards, logins, and PayPal credentials. That is why we have ...
Beware! 2018 “Olympic Destroyer”  Worm and It’s Hackers are Still Active

Beware! 2018 “Olympic Destroyer” Worm and It’s Hackers are Still Active

News have recently broken out that the same hacking group who have been detected to spread the malware, known as “Olympic Destroyer” to still be active and targeting different threat prevention facilities ...
.BIG4+ Files Ransomware (GlobeImposter) – How to Remove and Decrypt Data

.BIG4+ Files Ransomware (GlobeImposter) – How to Remove and Decrypt Data

This article has been created in order to best explain how to remove the .BIG+ variant of GlobeImposter ransomware virus from your computer and how to decrypt .BIG+ encrypted files for free ...
HeroRat Trojan image

HeroRat Trojan Uses Protocol from Telegram to Communicate

HeroRat is the newest Trojan threat that appears to use the Telegram protocols in order to set up a secure connection to the hacker-controlled servers. The discovery was made due to its ...
The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

The Changing Face of Malware: Malware Being Used as Cryptocurrency Miners

In my last article, I was discussing how malicious cryptocurrency mining is all set to exploit technological as well as human vulnerabilities this year. In this article, I will continue digging deeper ...
Security Boulevard's 5 Most Read Stories for the Week, June 11-15

Security Boulevard’s 5 Most Read Stories for the Week, June 11-15

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some ...
Security Boulevard
Application Exceeds its Brief

Security Flaws Allow Attackers to Hijack 400 Axis Camera Models

Axis Communications, one of the largest manufacturers of video surveillance equipment in the world, has fixed critical security flaws that affect some 390 of its network camera models. The vulnerabilities were found ...
Security Boulevard
.Alcohol Files Virus – How to Remove It and Decrypt Files for Free

.Alcohol Files Virus – How to Remove It and Decrypt Files for Free

This article has been created to help you by explaining how you can remove the .Alcohol variant of GlobeImposter ransomware and how to restore files that have been encrypted by virus. A ...
SamSam ransomware: controlled distribution for an elusive malware

SamSam ransomware: controlled distribution for an elusive malware

SamSam ransomware is a unique malware for its explicit human interaction on selected targets and care to erase most of its tracks. Categories: Malware Threat analysis Tags: ransomwaresamsamsamsam ransomware (Read more...) The ...
Loading...