Site search

Search results: «Malware»

Found matches: 21

More than 10,000 IP addresses were found infected with a previously unseen Linux variant of SystemBC, a powerful remote access trojan (RAT) that now mostly targets web servers across various hosting platforms.
#malware #cybersecurity
🛑 Reports of cyber attack against OpenClaw with malware that steals digital identity 😯
𝗮𝗽𝗸𝟮𝘂𝗿𝗹

It is an OSINT tool designed to quickly extract IP addresses and URLs from APK files through disassembly and decompilation processes. 🤖

Allows you to identify endpoints such as:

• URLs (http / https)
• IP addresses
• Dominions
• APIs
• Internal route
• Other patterns of interest

It is especially useful in:

🔎 Security analysis
🔬 Reverse engineering
🛡 Pentesting of mobile applications
🦠 Malware Analysis

Ideal for security investigators and mobile security professionals.

🔗 GitHub: https://github.com/n0mi1k/apk2url
Online platform that allows you to analyze suspicious files, URLs, domains and IPs using dozens of antivirus engines and security tools simultaneously. 🔍
Ideal for security analysts, pentesters, and cybersecurity enthusiasts who need to quickly check if a file or link may be malicious.
Allow:
• Analyzing potential malware
• Revisar reputación de dominios e IPs
• Detect threats before executing them
• Sharing intelligence with the security community
⚠️ Remember: any file you upload can be shared with the security community, avoid uploading sensitive or private information.
🌐 Tool:
https://www.virustotal.com
🚨 Wi-Fi Hacking: The Silent Threat Inside Your Home & Office

Most people think Wi-Fi hacking only means “someone using your internet.”
That’s a dangerous myth.

In reality, a compromised Wi-Fi network can become a gateway to total digital destruction.

🔓 What REALLY Happens When Wi-Fi Gets Hacked?

Once an attacker gains access to your Wi-Fi, they can:

🔴 Intercept encrypted traffic using evil twin & MITM attacks
🔴 Steal passwords, OTPs, cookies & sessions
🔴 Monitor everything you type (banking, emails, private chats)
🔴 Inject malware & spyware into connected devices
🔴 Turn your network into a launchpad for...
BLOCK WHATSAPP PHOTOS FROM APPEARING IN GALLERY

Pictures that you receive on WhatsApp are automatically stored in your phone’s Gallery, exposing them to anyone who browses photos on your phone. In iPhone, you can go into the phone’s Settings menu, then tap ‘Privacy’, ‘Photos’, and deselect WhatsApp which will restrict this.
For Android users it’s a little bit complicated.Using a file explorer app such as ES File Explorer, you can find WhatsApp’s ‘Images’ and ‘Videos’ folders and create a file within each called ‘.nomedia’. This will stop Android Gallery app from scanning the folder.

RESTRICT ACCESS TO PROFILE PICTURE
Set...
🛡️ HOW TO REMOVE VIRUS USING CMD (STEP-BY-STEP GUIDE)

Learn how to detect, stop, and remove viruses on Windows using Command Prompt — no extra software required. This guide covers killing malicious processes, revealing hidden files, cleaning startup entries, repairing system files, and securing your PC the right way.

⚠️ Always proceed carefully and back up important data. For best protection, combine manual cleanup with trusted security tools.

🛑 STEP 1: Open CMD as Administrator
Press Windows + X
Click Command Prompt (Admin) or Windows Terminal (Admin)
If you can’t open CMD normally:
Boot into Safe Mode with Command Prompt...
The Dark Web is a term used to describe the portion of the internet that is not indexed by standard search engines such as Google or Bing. It is a network of hidden websites and services that require specialised software, configurations, or authorisation to access.

While the Dark Web has legitimate uses as well, it is often associated with illegal activities such as drug trafficking and weapons sales. Here are five important things to know about the Dark Web.

What is the Dark Web and how does it work?
The Dark Web is part of the internet that is not...
1. There are 7.67 billion people on planet Earth, and only 3.5 billion of them use toothbrushes. However, more than 4 billion people use mobile phones.
2. 91% of all adults who use a mobile phone have it within reach 24 hours a day. 3. Only 25% of American phone users have access to the mobile Internet. 4. There are five times as many mobile phones in the world as computers. 5. 82% of adults in America own a mobile phone. 6. In the UK, 51% of mobile phone subscribers own a smartphone. In the US, that number is 49%....
“Hacking doesn’t break the locks now... He dressed up as a security guard. "

Even if the file looks secure... Windows doesn't warn you.. You can get the virus.

Hackers are now sending out fake meeting invitations to Zoom and Microsoft Teams with malicious files attached.

What’s the trick ? This file is documented with a stolen or hijacked digital signature.

*Windows will look at it as reliable
*No warning may come up
*Some protection programs can be allowed to pass

Simply: A hacker wears a true security certificate.

You are getting:
"Urgent meeting of the Board of Directors." ”...