Home > Martin Beltov

Author Archive: Martin Beltov - Page 39

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

CYBER NEWS

Next-gen XLoader Android and iOS Spyware Is Being Spread Worldwide

Complex malware are continuously being developed by hacking groups worldwide, the best of which go through numerous incarnations. The infamous XLoader Android and iOS spyware has been found to infect users in a new attack campaign spreading a new version.…

THREAT REMOVAL

WebHelper – WHAT IS IT + How to Remove It

What is WebHelper process? Is WebHelper a virus or is it legitimate file? Why WebHelper is running at 100% CPU? The WebHelper malicious threat is a widespread virus that is being spread across the Internet using various methods. While it…

THREAT REMOVAL
.mogera Ransomware virus remove

.mogera Ransomware – Remove It + Decrypt Files

The .mogera ransomware is a new release of the STOP malware family. An unknown hacker collective is behind it, at the moment an active campaign is being spread against users worldwide. Like previous releases of this family the criminal collective…

THREAT REMOVAL

Earn Bitcoin Scam — WHAT IS IT + How to Remove

This article has been created in order to explain to you what is the Earn Bitcoin Scam and how you can remove them as well as all potentially unwanted programs delivered through them. The Earn Bitcoin Scam is a popular…

THREAT REMOVAL
.sysfrog Ransomware virus remove

.sysfrog Ransomware — How to Remove It

The .sysfrog ransomware is a dangerous new virus release which is being distributed in an active new campaign. We anticipate that the most popular tactics are being used by the criminal collective. Such include the sending of phishing email messages…

THREAT REMOVAL
.les# Ransomware virus remove

.les# Ransomware — How to Remove It

The .les# ransomware is a new virus release of the Scarab family of threats. It is being spread against victims worldwide using the most popular distribution methods. This includes the coordination of email phishing messages and the crafting of malicious…

THREAT REMOVAL
portal.getlive.news redirect image

Remove portal.getlive.news redirect

What is portal.getlive.news page? Which program causes portal.getlive.news redirects? How to remove the unwanted program, causing portal.getlive.news redirects from your computer? The portal.getlive.news redirect is a dangerous site and hijacker combination which was reported in several reports. An active attack…

THREAT REMOVAL
Usarewardspot.com redirect image

Remove Usarewardspot.com redirect

What is Usarewardspot.com page? Which program causes Usarewardspot.com redirects? How to remove the unwanted program, causing Usarewardspot.com redirects from your computer? The Usarewardspot.com redirect is a dangerous threat which is being spread worldwide using several distribution methods at once. At…

THREAT REMOVAL
HeroRat Trojan image

Remove DealAlpha Trojan From Your PC

What is DealAlpha? How to remove DealAlpha Trojan from your PC or Mac? The DealAlpha Trojan is a common malware threat which is designed for Microsoft Windows computers. It can be acquired from various sources, every attack campaign can focus…

THREAT REMOVAL
.ONYC Ransomware virus remove

ONYC Ransomware — How to Remove It

Security reports indicate that a new dangerous virus is being released in the wild — the .ONYC ransomware. It is being spread by an unknown hacking collective using common methods. A popular strategy is to send out phishing emails and…

THREAT REMOVAL
search.hdocumentconverter.app redirect image

Remove HSearch.hdocumentconverter.app Redirect

What is search.hdocumentconverter.app page? Which program causes search.hdocumentconverter.app redirects? How to remove the unwanted program, causing search.hdocumentconverter.app redirects from your computer? Search.hdocumentconverter.app redirect is a new hijacker and malware site which is available worldwide and being launched by an unknown…

THREAT REMOVAL
Hogathe.com redirect image

Remove Hogathe.com Redirect

What is Hogathe.com page? Which program causes Hogathe.com redirects? How to remove the unwanted program, causing Hogathe.com redirects from your computer? The Hogathe.com redirect is a new malware site and browser hijacker which is rapidly being released to computer victims…

THREAT REMOVAL
BulbaCrypt .Crypted ransomware virus remove

BulbaCrypt .Crypted Ransomware — How to Remove It

The BulbaCrypt .Crypted ransomware is a new release of the Hidden Tear malware family. Like previous releases of this type it is presumed that a small and yet unknown hacking group is behind it. Viruses of this type are widely…

THREAT REMOVAL

Remove Astaroth Trojan From Your PC

The Astaroth Trojan is a dangerous weapon used against computer users worldwide. It infects mainly via infected software installers. Our article gives an overview of its behavior according to the collected samples and available reports, also it may be helpful…

THREAT REMOVAL
.TOR13 Files Virus (Dharma)

.TOR13 Files Virus (Dharma) – How to Remove It

In this article, you will find more information about .TOR13 files virus as well as a step-by-step guide on how to remove malicious files from the infected system and how to potentially recover files encrypted by this ransomware. The .TOR13…

THREAT REMOVAL
.EZDZ Ransomware virus remove

.EZDZ Ransomware — How to Remove It

The .EZDZ ransomware is a new threat which is begin spread by an unknown hacker collective. So far we do not know much about the group behind it and as such we cannot determine whether or not this is the…

CYBER NEWS

Airplanes Are Hackable According To Newly Published Security Report

The latest security report from a research team sheds light on a very serious issue in cybersecurity — airplanes can be easily hacked by criminals. According to the released information this is not the result of a vulnerability, but of…

CYBER NEWS
GitHub and BitBucket attacked by ransomware

Hackers Execute Ransomware on GitHub and BitBucket Repositories

A radical new approach is being utilized by hackers who want to blackmail victims of their ransomware to pay them a decryption fee. The new strategy is to encrypt developer repositories on popular services like GitHub and BitBucket by breaking…

THREAT REMOVAL

CompatTelRunner.exe – WHAT IS IT + How to Remove It

What is CompatTelRunner.exe process? Is CompatTelRunner.exe a virus or is it legitimate file? Why CompatTelRunner.exe is running at 100% CPU? The CompatTelRunner.exe malware is a dangerous virus which imitates the legitimate Windows process which is otherwise as Windows Compatibility Telemetry.…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree