Home > Martin Beltov

Author Archive: Martin Beltov - Page 27

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Magecart Hackers Breach Fake Brand E-Commerce Sites

The infamous Magecart hacking group has been fund to be behind a large-scale attack against e-commerce sites. They have been found to replace JavaScript code into numerous sites that list counterfeit big brands products. Examples include the likes of Nike,…

THREAT REMOVAL

Remove Nbes Virus (.nbes File) – Ransomware Guide

virus is the name of a ransomware infection that infects computers with Windows systems. It is a variant of STOP ransomware that has actually been hiding across the internet for quite a long time. The key goal of this destructive…

THREAT REMOVAL
stf-Bob Electron-virus-file-globeimposter-ransomware

.bobelectron Virus (Globe Imposter Ransomware) — How to Remove It

.bobelectron Virus File – is it a Globe Imposter? What is Bob Electron ransomware? Bob Electron is a Globe Imposter ransomware variant. Can files encrypted by Bob Electron be recovered? Bob Electron Virus or otherwise known as .bobelectron Virus File…

CYBER NEWS

NGINX Office Raided By Russian Police: Co-Founders Have Been Detained

The office of one of the world’s most popular web servers NGINX located in Moscow has been raided by Russian Police. Several media report indicate that the authorities have also detained several of the employees, including two of the co-founders…

CYBER NEWS
cryptocurrency miner image

Process Hollowing Technique Used to Install Cryptocurrency Miners

A team of security researchers reported the discovery of a new technique used to install cryptocurrency miners without raising awareness that’s called Process Hollowing. This is done by using a sophisticated dropper capable of delivering the intended malware. The main…

THREAT REMOVAL
Phoenix Keylogger image

Remove Phoenix Keylogger From Your PC

What is Phoenix Keylogger? How to remove Phoenix Keylogger from your PC or Mac? The Phoenix Keylogger is a dangerous malware threat for Microsoft Windows computers. It can be acquired from various sources. What we know for sure is that…

CYBER NEWS

Google Patches Severe Gmail “DOM Clobbering” Security Bug

Google has patched a dangerous vulnerability in Gmail which is related to an instance in which web browsers execute rich code, also known as “DOM Clobbering”. The bug was reported to the company in August 2019 by a security expert.…

THREAT REMOVAL
mytelevisiononline.com redirect image

Remove mytelevisiononline.com Redirect From Your Computer

What is mytelevisiononline.com page? Which program causes mytelevisiononline.com redirects? How to remove the unwanted program, causing mytelevisiononline.com redirects from your computer? The mytelevisiononline.com redirect is a web browser hijacker and dangerous site which are currently distributed in an active attack…

THREAT REMOVAL
Winnerwinner.net redirect image

Remove Winnerwinner.net Redirect From Your Computer

What is Winnerwinner.net page? Which program causes Winnerwinner.net redirects? How to remove the unwanted program, causing Winnerwinner.net redirects from your computer? The Winnerwinner.net redirect is a web browser hijacker and dangerous site which are currently distributed in an active attack…

THREAT REMOVAL
MZRevene ransom note

MZRevenge Virus (Ransomware Infection) – How to Remove It

What is ransomware? How does work? How to open files? How to remove and try to restore files, encrypted by it? The virus is actually a ransomware infection, whose main idea is to make sure that you won’t be able…

CYBER NEWS

Ongoing Hybrid Phishing Attacks Can Bypass Security Solutions

Phishing strategies are among the most widely used strategies used to scam and manipulate the intended user into falling victim to viruses and various crimes. However most of the phishing strategies can be easily detected and bypassed. At this time…

CYBER NEWS

Evil Corp Hackers that stole $100 Million Indicted by US DoJ

Over the years there have been constant attacks with various malware, one of the main culprits appears to be a Russian hacking group called Evil Corp. The are reported to have hijacked more than $100 million in various campaigns focusing…

THREAT REMOVAL
New DeathRansom Virus virus remove

Remove DeathRansom Virus (Ransomware Removal Guide)

The DeathRansom Virus is a ransomware that is currently set against target end users on a global scale. There is no information available about the hacking group behind it. It is believed to be a new iteration of the DeathRansom.…

THREAT REMOVAL
Socelars Trojan image

Remove Socelars Trojan From Your Computer

What is Socelars? How to remove Socelars Trojan from your PC or Mac? The Socelars Trojan is a dangerous malware threat for Microsoft Windows computers. It can be acquired from various sources, the main ones are fake hacker-controlled sites that…

THREAT REMOVAL

.abcd Virus File (LockBit Ransomware) – Remove It (Update March 2020)

This article has been created in order to best explain what is LockBit ransomware and how you can remove it from your computer. LockBit Ransomware is a virus whose main idea is to enter your computer and encrypt your files…

THREAT REMOVAL
.[helpnetin@protonmail.com].com-virus-file-dharma-ransomware-note-stf

.[helpnetin@protonmail.com].com Virus File (Dharma Ransomware) – Remove It

The .[helpnetin@protonmail.com].com files virus is a ransomware from the Crysis/Dharma family. It is extremely dangerous ransomware due to the fact that it encrypts personal files located on the local drives as well as shared network directories. The primary goal of…

THREAT REMOVAL

Driver Tonic Virus – What Is It and Removal (Update January 2020)

Are you struggling to remove Driver Tonic from your computer? Are you wondering what is the right method to get rid of the Driver Tonic “Virus”? This article will provide you with useful information. Driver Tonic is a program that…

THREAT REMOVAL

Remove cPanel Hosting Scams — Protect Yourself

This article has been created in order to explain to you what is the cPanel Hosting Scams and how you can remove them as well as all potentially unwanted programs delivered through them. The cPanel hosting site scams is a…

THREAT REMOVAL
.Nemty_-DECRYPT-txt-.Nemty_-project-ransomware-virus-ransom-note

Nemty Revenge 2.2 Virus (Nemty Ransomware) – Remove It

What is ransomware? How does work? How to open files? How to remove and try to restore files, encrypted by it? The is actually a ransomware infection, whose main idea is to make sure that you won’t be able to…

THREAT REMOVAL

.wvtr0 Virus File (Snatch Ransomware) – How to Remove

This article has been created in order to best explain what is Snatch ransomware and how you can remove it from your computer. Snatch Ransomware is a virus whose main idea is to enter your computer and encrypt your files…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree