Best Security Search

All posts by Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

ROKRAT Malware Spreads in South Korea
High
70%
Suspicious Software

ROKRAT Malware Spreads in South Korea

Cisco Talos experts discovered a dangerous new malware threat which is known as ROKRAT and is delivered via email spam messages. ROKRAT Malware Discovered Security researchers from Cisco Talos discovered a dangerous new malware named ROKRAT which target users in South Korea. It is distributed mainly through a large-scale email phishing campaign. It uses template…

Fake VPN Services Trick Users Into Using Them
Security News

Fake VPN Services Trick Users Into Using Them

computer network featured image

In the last few years security researchers discovered an increasing number of fake VPN services that trick users into paying for counterfeit privacy protection. Fake VPN Service Proliferate Online Computer hackers continuously attempt to trick users into various types of scams. One of the most dangerous ones is the advertisement of counterfeit services. The malicious…

Microsoft Word Vulnerability Exploited In Email Campaign
Security News

Microsoft Word Vulnerability Exploited In Email Campaign

Email Spam Featured Image

Computer hackers are actively exploiting a critical issue (CVE-2017-0199) in Microsoft Word via a large-scale email campaign, read our article to learn more about the problem. The Microsoft Word Vulnerability (CVE-2017-0199) Used In Email Scams Security specialists discovered that computer hackers are taking advantage of a Microsoft Word vulnerability – CVE-2017-0199. The alarming fact is…

Lambert Toolkit Malware Family Unraveled
Suspicious Software

Lambert Toolkit Malware Family Unraveled

Lambert Toolkit Malware Featured Image

This guide will give you detailed technical information and removal instructions about the Lambert Toolkit which is also known under the alias of Longhorn. Lambert Toolkit Malware Analysis The first instance of the Lambert Toolkit was detected back in 2014 when FireEye staff discovered a hacker attack initiated through a zero-day vulnerability. The reported issue…

BrickerBot Malware Destroys IoT Devices
Security News

BrickerBot Malware Destroys IoT Devices

BrickerBot malware IoT infection pattern

Researchers Uncovered a dangerous attack campaign that delivers the BrickerBot malware that is able to literally destroy IoT devices. BrickerBot IoT Malware Spreads Rapidly Security specialists detected an ongoing attack campaign that carries a dangerous new weapon called the BrickerBot. This is a new malware that infects IoT devices and physically disable them and cripple…