Best Security Search

All posts by Martin Beltov

Martin graduated with a degree in Publishing from Sofia University. As a cyber security enthusiast he enjoys writing about the latest threats and mechanisms of intrusion.

Another Core WordPress Vulnerability Found
Security News

Another Core WordPress Vulnerability Found

Sucuri security researchers have identified a core component of the WordPress content management systems that allows hackers to install malicious redirects in the sites. WordPress Can Be Compromised with a Core Component Sucuri specialists have identified a new security vulnerability in the WordPress content management system which powers a large portion of sites on the…

Ransomware

Get Rid of the Fs0ci3ty Ransomware Infection

Windows-key-plus-R-button-launch-Run-Box-in-Windows-illustrated

Fs0ci3ty is the latest computer malware that is inspired by a pop phenomenon, this time its Mr. Robot again. We have witnessed a previous attempt at a ransomware that shares the name of the threat FSociety which operates in a similar manner. Fs0ci3ty Ransomware Description This is a new ransomware variant that encrypts certain files…

Mirai Source Code Released
Security News

Mirai Source Code Released

The criminal creator of the Mirai backdoor has released the source code for the Trojan botnet which was used in the attack against Brian Krebs. The massive campaign against him is the biggest DDOS attack against in individual. Mirai Source Code now Public The code for the infamous Mirai botnet Trojan has been released by…

How To Remove .LOL! Ransomware from Your Computer
Ransomware

How To Remove .LOL! Ransomware from Your Computer

The newly discovered.LOL! Ransomware is a ransomware variant of PGPCoder, and it behaves in the usual way by encrypting user files by targeting specific file name extensions. .LOL! Ransomware Description The .LOL! Ransomware inflicts as much damage as possible, as it is a variant of another famous and aggressive threat – PGPCoder. The criminal operators…

DefecTor Attack Can Reveal TOR Sources
Security News

DefecTor Attack Can Reveal TOR Sources

Researchers have discovered an attack method called DefecTor that can be used to deanonymize TOR traffic. DefecTor uses DNS fingerprint attacks can pose a threat to TOR The popular anonymous network TOR has been widely used by privacy-minded users and criminals to browse the Internet avoiding censorship and accessing the Dark Web, the shadier network…