malware

  1. GhostRedirector: IIS Backdoor and SEO Fraud with Rungan & Gamshen

    A compact but sophisticated campaign tracked as GhostRedirector has infected at least 65 Internet‑facing Windows IIS servers and paired a stealthy native backdoor with an in‑process IIS module to run a covert, profitable SEO fraud operation that pushes third‑party gambling sites while leaving...
  2. Solana-Scan Infostealer: Malicious NPM Packages Steal Wallet Keys

    A cluster of malicious npm packages — cataloged by researchers as a targeted infostealer campaign dubbed “Solana‑Scan” — has been used to lure Solana ecosystem developers into installing backdoored SDKs that harvest wallet credentials, local keyfiles and a broad sweep of developer artifacts...
  3. Lakeside Bar on Windows: Safe Steam Play vs Piracy Risks

    A cozy bar-management sim just poured onto Steam, but a wave of “free download” pages is already trying to cash in on the buzz—some even urge Windows users to disable antivirus and run a cracked build bundled with a Steam emulator. Here’s what’s actually official, what’s risky, and the safest...
  4. How Ransomware Hacks Windows 11 by Abusing Intel Drivers to Disable Antivirus

    A potent wave of ransomware attacks has uncovered a cunning new strategy in cybercrime: hackers are leveraging a legitimate Intel CPU tuning driver to disable Windows 11’s built-in antivirus, leaving systems dangerously exposed. The Akira ransomware, already notorious for its aggressive...
  5. How Threat Actors Exploit Microsoft 365 Direct Send to Bypass Email Security

    Threat actors have escalated their tactics by exploiting the Microsoft 365 Direct Send feature, fundamentally altering the landscape of email-based cyber attacks. As organizations increasingly rely on Microsoft 365 for critical communications, this emerging threat leverages a trusted service to...
  6. HELP WITH cdn.7tv.app''''

    IN MY BIT Defender i get cdn.7tv.app is there way i can remove it or block it?
  7. Npm Supply Chain Attack: Malware Campaign Compromises Popular Packages & Developer Security

    The npm JavaScript ecosystem has once again been rocked by a coordinated malware campaign, this time targeting both cross-platform and Windows-specific environments through widely trusted packages. The incident, centered around the highly popular "is" package and several linting tools associated...
  8. Interlock Ransomware 2025: Evolving Threats, Tactics, and Defense Strategies

    Interlock ransomware has quickly ascended from a little-known name in late 2024 to a top-tier threat that’s been hammering organizations across North America and Europe through 2025. While other ransomware groups have faltered or faded, Interlock actors show a relentless willingness to innovate...
  9. UK NCSC Warns of APT28's Sophisticated Cyber-Espionage Using Authentic Antics Malware

    The UK's National Cyber Security Centre (NCSC) has recently disclosed a sophisticated cyber-espionage campaign orchestrated by the Russian state-sponsored group APT28, also known as Fancy Bear. This campaign employs a malware strain dubbed "Authentic Antics" to infiltrate Microsoft 365 accounts...
  10. Russian State-Sponsored Cyber Attacks Expose Microsoft Outlook Vulnerabilities: Authentic Antics Malware

    Russian state-sponsored hacking campaigns have once again made international headlines, following the UK’s public attribution of a newly discovered malware strain—nicknamed “Authentic Antics”—to the infamous APT28 group, also known as Fancy Bear or Forest Blizzard. This revelation not only draws...
  11. LapDogs Cyber Espionage Campaign Targets SOHO Devices Using Covert ORB Networks

    Security researchers have uncovered a sophisticated cyber espionage campaign, dubbed "LapDogs," that has compromised over 1,000 small office/home office (SOHO) devices worldwide. This campaign, attributed to China-linked threat actors, leverages these devices to form an Operational Relay Box...
  12. Ransomware Rise: How the YES24 Cyberattack Reveals Global Digital Security Risks

    Four days of total digital silence. That was the stark reality for the 20 million users of YES24, South Korea’s largest online bookstore, after a catastrophic ransomware attack forced the entire platform—website and app—offline. Orders for books, reservations for concerts, and access to digital...
  13. B

    Folders' contents disappeared

    I was saving pics for years in my Downloads, in folders separated by years and each year by month, so I had a bunch of folders and sub-folders with pics and videos saved throughout the years. Today, while I was away content from all folders disappeared but named folder are still there just all...
  14. SmartAttack: How Smartwatches Can Hack Air-Gapped Security Systems

    For decades, the fortress-like defense of air-gapped computers—those completely disconnected from external networks—has stood as a cornerstone of security in top-secret governmental agencies, defense contractors, and industries with critical infrastructure. The guiding philosophy was simple: if...
  15. Beware of DeepSeek-R1 Malware: How Cybercriminals Exploit AI Popularity to Infect Windows Users

    The rapid ascent of DeepSeek-R1, an advanced large language model (LLM), has not only captivated the AI community but also attracted the attention of cybercriminals. These malicious actors are exploiting the model's popularity to distribute sophisticated malware targeting Windows users. This...
  16. Playcrypt Ransomware Group: Evolving Threats, Attack Tactics, and Defense Strategies in 2025

    The Play ransomware group, more commonly referred to in cybersecurity circles as “Playcrypt,” has carved out a chilling reputation across the digital threat landscape since its emergence in mid-2022. This ransomware-as-a-service operation has evolved from relative obscurity to become one of the...
  17. Pure Crypter and Windows 11 24H2: The Evolving Malware Evasion Arms Race

    The cybersecurity landscape continues to evolve at an unprecedented pace, with malware creators and defenders locked in a relentless contest of innovation. Nowhere is this battle more apparent than in the dynamic interplay between cutting-edge malware packaging tools and the latest operating...
  18. Warning: Sophisticated Malware Campaign Targets Windows Users with Fake Websites

    In recent developments, cybersecurity researchers have uncovered a sophisticated malware campaign targeting Microsoft Windows users. Attackers are deploying deceptive websites that mimic popular brands to trick individuals into downloading malicious applications. These counterfeit sites often...
  19. Microsoft Dismantles Lumma Stealer Malware Infrastructure to Combat Global Cyber Threats

    In a significant move against cybercrime, Microsoft has taken decisive legal action to dismantle the infrastructure of Lumma Stealer, a sophisticated malware that has infected approximately 400,000 Windows computers worldwide over the past two months. This operation underscores the escalating...
  20. Lumma Stealer Malware: How to Protect Your Windows PC from Data Theft in 2025

    In recent months, a formidable cyber threat known as Lumma Stealer has emerged, compromising nearly 400,000 Windows PCs worldwide between March 16 and May 16, 2025. This malware, also referred to as LummaC2, is a sophisticated information stealer offered as Malware-as-a-Service (MaaS) by a group...