Submit your search
2022-06-19
When scammer give you his private key of crypto wallet

In the crypto and blockchain world, unfortunately, we find scammers who strive to be able to directly or indirectly steal the funds of the unfortunate who for one reason or another fall victim to the same scammers. There are several scams and tricks that criminals use but this time we will focus on a really […]

Read More
2022-06-07
PDF can contain malicious Word document

Threat analysts have discovered a recent malware distribution campaign using PDF attachments to smuggle malicious Word documents that infect users with malware. The choice of PDFs is unusual, as most malicious emails today arrive with DOCX or XLS attachments laced with malware-loading macro code. However, as people become more educated about opening malicious Microsoft Office […]

Read More
2022-06-07
Block malicious domains by using Alvosec lists for uBlock

The uBlock Origin is a free and open-source, cross-platform browser extension for content filtering - primarily aimed at neutralizing privacy invasion in an efficient, user-friendly method. There are many free lists - used to block advertisements, trackers, malware, and annoyances. We've made three lists, that can be imported in uBlock Origin extension, to increase security […]

Read More
2022-06-05
Browser In The Browser (BITB) Attack

A novel phishing technique called browser-in-the-browser (BitB) attack can be exploited to simulate a browser window within the browser in order to spoof a legitimate domain, thereby making it possible to stage convincing phishing attacks. According to penetration tester and security researcher, who goes by the handle mrd0x on Twitter, the method takes advantage of […]

Read More
2022-06-05
CVE-2022-30190: Microsoft Support Diagnostic Tool (MSDT) RCE Vulnerability "Follina"

Description A vulnerability has been discovered in Microsoft Support Diagnostic Tool (MSDT) which could allow for arbitrary code execution. MSDT can be called using the URL protocol from a calling application like Word allowing an attacker to run arbitrary code with the privileges of the user that executed the program. An attacker can entice a […]

Read More
2022-05-29
Exposed! How scammers steal crypto private keys?

We must say that by the time of our researching crypto scams, we have witnessed that methods of these scammers are getting more and more sophisticated, and that's why we advise all users to be extra cautious when they engage with something unusual/unverified.

Read More

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram