Malware and viruses. We all heard these two cybersecurity-related terms, and people often use them interchangeably. Is such use legitimate? Let us delve into the terminology of harmful software to judge the malware vs. virus...
Security
Tiworker.exe High CPU Usage
Tiworker.exe is a system process you can spectate in Task Manager. The Windows Modules Installer Worker runs in the background, together with tens of other Windows processes. A lot of users do not know about its purpose and think...
Monero and DarkCoin: an odious pair of cryptotokens
Monero and DarkCoin have ill fame of the coins that are very popular among cybercriminals. The reasons for such popularity hide in their technical details and some of the historical details. Monero and DarkCoin: a short...
How To Recognize, Remove, and Avoid Malware?
Malware is one of the biggest threats to the security of your computer, tablet, phone, and other devices. Under this term, we used to mean viruses, spyware, ransomware, and other unwanted software that gets secretly installed...
REvil group member was deanonymized
The REvil group is in the spotlight through the last two weeks. Compromised servers, claims about the complete shutdown, and now – deanonymizing of their key persons. Is that just a coincidence, or the result of well...
REvil group shutdown. Analyzing the case
On October 17, 2021, one of the REvil group administrators made a shocking claim on a Darknet forum. The REvil group got their servers compromised and decided to go offline for a while, and then stated that they will never go...
MSERT tool is able to find and remove the web shells for Exchange Server
Microsoft products are one of the most exploitable things that are currently available on the software market. People who use it constantly not only meet different bugs, but also risk getting their systems infected through the...
Network Security in a Nutshell. That’s how you protect your workgroup
The Internet is swarming with tamperers, fraudulent schemes, and malicious computer programs. Antivirus software developers do enormous work to keep track of all existent harmful pieces of code. Security specialists around the...