Antivirus

This antivirus actually respects your Mac

Macworld Mac users, we get it—you don’t like bloated, ugly antivirus software slowing down your beautifully tuned machines. But you also don’t want to be the one person who ignores modern cyber threats just because “Macs don’t get viruses.” Spoiler: they can and they do. If you’re looking for a lightweight…

Macworld

Mac users, we get it—you don’t like bloated, ugly antivirus software slowing down your beautifully tuned machines. But you also don’t want to be the one person who ignores modern cyber threats just because “Macs don’t get viruses.” Spoiler: they can and they do.

If you’re looking for a lightweight…
Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Don’t fall for McAfee’s tricky antivirus warnings on your laptop

I review a lot of laptops and I’ve noticed many of them come with a “free trial” of McAfee antivirus preinstalled. I’ve clicked through so many warnings about how my PC will be “at risk” unless I pay up for extended protection, and those McAfee alerts are in a stark red color that’s surely designed

I review a lot of laptops and I’ve noticed many of them come with a “free trial” of McAfee antivirus preinstalled. I’ve clicked through so many warnings about how my PC will be “at risk” unless I pay up for extended protection, and those McAfee alerts are in a stark red color that’s surely designed to scare me…
Read More

Continue Reading
Antivirus

I tested the best antivirus software for Windows: Here’s what I’d use to protect my PC

ZDNET tested the best antivirus software on the market that supports multiple operating systems, VPNS, and robust protection…

ZDNET tested the best antivirus software on the market that supports multiple operating systems, VPNS, and robust protection…
Read More

Continue Reading
Antivirus

Your antivirus is under attack from new “killer” tool – here’s what we know

EDRKillShifter is getting a dangerous upgrade The new malware can disable AV and EDR from reputable vendors Sophos, Bitdefender, and Kaspersky among the tools being targeted Cybercriminals appear to have improved their antivirus-killing capabilities, as recent research suggest a new tool being shared within the underground community. In a new report, security researchers from Sophos


  • EDRKillShifter is getting a dangerous upgrade
  • The new malware can disable AV and EDR from reputable vendors
  • Sophos, Bitdefender, and Kaspersky among the tools being targeted

Cybercriminals appear to have improved their antivirus-killing capabilities, as recent research suggest a new tool being shared within the underground community.

In a new report, security researchers from Sophos said multiple ransomware groups are successfully disabling endpoint detection and response (EDR) systems before deploying the encryptor.

Originally, the group known as RansomHub developed a tool called EDRKillShifter, which Sophos says is now made obsolete thanks to this new and improved variant. The new tool can disable security software from multiple high-end vendors such as Sophos, Bitdefender, and Kaspersky.

You may like

  • ransomware avast This devious ransomware is able to hijack your system to turn off antivirus
  • A robot hand touching a locked digital shield blocking a human from accessing data Hackers can turn off Windows Defender with this sneaky new tool
  • A digital representation of a lock This top security platform is being hacked to carry out malware threats

Shifting strategies

The malware is often packed using a service called HeartCrypt, which obfuscates the code to evade detection.

Sophos found the attackers are using all sorts of obfuscation and anti-analysis techniques to protect their tools from security defenders, and in some cases, they’re even using signed drivers (either stolen or compromised).

In one case, the malicious code was embedded inside a legitimate utility, Beyond Compare’s Clipboard Compare tool, the researchers explained.

Sophos also said that multiple ransomware groups are using this new EDR-killing tool, suggesting a high level of collaboration between players.

EDRKillShifter was first spotted in mid-2024, after a failed attempt to disable an antivirus and deploy ransomware.

Sophos then uncovered that the malware dropped a legitimate, but vulnerable driver.

Now, it seems there is a new method – taking an already legitimate executable and modifying it locally by inserting malicious code and payload resources (as was the case with Beyond Compare’s tool). This is often done after the attacker has access to a

Read More

Continue Reading
Antivirus

Gamers at risk as scammers are using malware-infected cheats and mods to steal passwords and crypto — here’s how to stay safe

Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data Verified crypto wallets like MetaMask and Exodus are being drained through browser injection Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing


  • Cheats and mods are now frontlines for cybercrime targeting gamers’ wallets and private data
  • Verified crypto wallets like MetaMask and Exodus are being drained through browser injection
  • Trojan.Scavenger abuses overlooked flaws to disable browser safety and manipulate trusted extensions

Gamers seeking performance enhancements or special abilities through third-party patches and mods may be unwittingly exposing themselves to sophisticated malware, experts have warned.

Recent findings from Dr.Web revealed a malware family known as “Trojan.Scavenger” which targets Windows users by disguising itself as cheats or enhancements for popular games.

This seemingly harmless mod can ultimately compromise crypto wallets, password managers, and web browsers, posing serious risks to user privacy and digital assets.

You may like

  • GTA VI personages Experts warn GTA and Minecraft being used to lure in cyberattack victims – here’s how to stay safe
  • Best cheap game server hosts appeals to Minecraft users Minecraft players watch out – these fake mods are hiding password-stealing malware
  • Malware Criminals are using a dangerous fake free VPN to spread malware via GitHub – here’s how to stay safe

When cheats become covert threats

The infection chain begins when users download ZIP archives claiming to improve performance in games including the likes of Grand Theft Auto 5 or Oblivion Remastered.

These archives contain modified dynamic libraries, sometimes renamed with extensions like .ASI to resemble legitimate plugin formats.

When the user follows the installation instructions, the malicious library is placed in the same folder as the target game. If the game does not properly validate its libraries, the trojan loads automatically at startup.

In some cases, flaws in library search priorities are essential to the malware’s success, allowing it to hijack execution within the host application.

Once loaded, the malware establishes contact with a command-and-control server using encrypted communication. This process includes verifying encryption keys and checking timestamp consistency, which is meant to evade analysis and block antivirus detection.

The malware doesn’t stop with the initial payload. In more complex infections, it deploys additional trojans that embed themselves in Chromium-based browsers like Chrome, Edge, Opera, and Yandex.

These troj

Read More

Continue Reading