News, Tips, Security Lab
Trojan:Win32/Vigorf.A
Trojan:Win32/Vigorf.A is a generic detection of Microsoft Defender. This detection commonly identifies a running loader malware that may deal significant…
Trojan:Win32/Znyonm
Trojan:Win32/Znyonm is a detection often seen during the backdoor malware activity in the background. Such malware can escalate privileges, enable…
Fortinet RCE Vulnerability Affects FortiClient EMS Servers
Fortinet disclosed a critical vulnerability affecting FortiClient EMS products in March 2024. This vulnerability, categorized as an SQL injection, poses…
Win32/Wacapew.C!ml Detection Analysis & Recommendations
Win32/Wacapew.C!ml detection refers to programs that have suspicious properties. This can be either a false positive or a detection of…
PUABundler:Win32/uTorrent_BundleInstaller
PUABundler:Win32/uTorrent_BundleInstaller is a Microsoft Defender detection that is associated with the installer of the once popular uTorrent client. It is…
Vmmem High Memory and CPU Usage
Vmmem, short for “Virtual Machine Memory,” is a process that indicates the resource utilization by virtual machines on your system. It operates in tandem with virtual machines and remains inactive…
Dwm.exe High Memory Usage – Troubleshooting Dwm Process
The dwm.exe process is an important Windows component that is responsible for the visual design of the desktop. It provides effects such as transparency, animation and window switching. However, sometimes…
Malicious Fake ChatGPT Apps: 7 AI Malware Scams to Avoid
Public release of ChatGPT made a sensation back in 2022; it is not an exaggeration to say it is a gamechanger. However, the scammers go wherever large numbers of people…
MIT Hacked, Students’ Data Sold on the Darknet
On February 13, 2024, a post on a Darknet forum appeared, offering to purchase a large pack of data leaked from Massachusetts Institute of Technology (MIT). The hacker under the…
Warzone RAT Dismantled, Members Arrested
In an international law enforcement operation, the U.S. Department of Justice continues its fight against cybercriminals. The operation dismantled a network that sold and supported the Warzone Remote Access Trojan…
HijackLoader Malware Comes With New Evasion Methods
The HijackLoader malware has added new defense evasion techniques. Other threat actors are increasingly using the malware to deliver payloads and tooling. The developer used a standard process hollowing technique…
New Fortinet VPN RCE Flaw Discovered, Patch ASAP
Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be actively exploited by attackers. The vulnerability in Fortinet network security…
Shim Bootloader Vulnerability Affects Linux Systems
Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute malicious code and gain control of target systems before the…
Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads
A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs. The malware is designed to steal sensitive information and crypto…
Third Ivanti VPN Vulnerability Under Massive Exploitation
Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue for corporate VPN devices. The new vulnerability allows unauthorized access…
Tax Season Scams On The Rise, Beware!
Tax season has already begun, and so did tax season scams. The IRS annually lists its top tax scams to help taxpayers protect themselves. Most tax season scams involve identity…
Docker API Vulnerability Exploited in Cryptojacking Campaign
A new campaign named “Commando Cat” uses a Docker API vulnerability. It uses Docker to gain initial access to a system and then deploys a series of malicious payloads. This…