browsers

Tech Optimizer
March 27, 2026
A deceptive website impersonating Avast antivirus tricks users into downloading Venom Stealer malware, which steals passwords, session cookies, and cryptocurrency wallet information. The site conducts a fake virus scan, falsely reporting threats to encourage users to download a malicious file named Avastsystemcleaner.exe. This file mimics legitimate software and operates stealthily, targeting web browsers to harvest credentials and session cookies. It also captures screenshots and sends stolen data to the command-and-control domain app-metrics-cdn[.]com via unencrypted HTTP. The malware employs evasion techniques to avoid detection and is part of a long-standing cybercrime tactic that exploits user trust in security software. Indicators of compromise include the file hash SHA-256: ecbeaa13921dbad8028d29534c3878503f45a82a09cf27857fa4335bd1c9286d, the domain app-metrics-cdn[.]com, and the network indicator 104.21.14.89.
Winsage
March 24, 2026
Mozilla Firefox has released version 149, which includes features such as Split View, a free VPN for public Wi-Fi, enhanced PDF performance, and improved security measures that block notifications and revoke permissions on malicious websites. Firefox allows users to easily disable all AI features with a single switch, while Microsoft Edge requires users to navigate through multiple settings. Firefox is available for download on its website and the Microsoft Store.
Tech Optimizer
March 19, 2026
The ransomware group LeakNet has evolved its tactics, increasing its average targets from three per month and shifting from purchasing stolen network access to launching its own campaigns. They now use deceptive error screens and a new tool that executes malicious code in a computer's memory. Their strategy includes ClickFix lures, which compromise legitimate websites to display fake security checks, tricking users into executing malicious commands. This method broadens their victim reach and reduces costs. The Deno loader, part of this strategy, collects machine information and retrieves additional malicious code without leaving standard files, making detection difficult. After infiltrating a network, LeakNet checks for active user credentials and uses PsExec for lateral movement, employing Amazon S3 buckets for payload staging and data exfiltration. Defenders are advised to monitor for suspicious behavior rather than just known malicious files, focusing on unusual web commands and unexpected cloud storage connections.
Winsage
March 19, 2026
The command line on Windows can be intimidating for average users, but tools like Windows Terminal enhance its usability with features such as tabbed browsing and improved text rendering. Winget allows users to install multiple applications simultaneously in the background, streamlining the setup process for new PCs. Oh My Posh improves the PowerShell prompt by providing contextual information and customizable themes. Git enables users to track changes and revert mistakes in files, while the bat command allows for quick viewing of text files in the terminal with syntax highlighting. These tools collectively enhance the Windows user experience by making the command line more accessible and efficient.
Winsage
March 14, 2026
Microsoft is investigating an issue affecting some Samsung laptops running Windows 11, particularly after the February 2026 security updates, where users are losing access to their C: drive. This problem prevents them from launching essential applications and is reported to display an error message stating, "C: is not accessible – Access denied." The issue appears to be linked to specific Samsung software, with reports mainly coming from Brazil, Portugal, South Korea, and India, particularly involving the Samsung Galaxy Book 4. The problem is confined to Windows 11 versions 25H2 and 24H2. A workaround has been suggested that involves changing the ownership of the C: drive to the "Everyone" group, but this poses security risks, and users are advised to wait for an official fix from Microsoft.
AppWizard
March 12, 2026
Cybersecurity researchers have identified six new families of Android malware designed to extract sensitive data and facilitate financial fraud. Notable threats include: - PixRevolution: Targets Brazil's Pix payment platform, activates during Pix transfers, and uses real-time monitoring to intervene in transactions. Victims are tricked into installing malicious apps from counterfeit Google Play Store listings, which enable accessibility services for the malware to capture screens and overlay fake interfaces to reroute funds. - BeatBanker: Spreads through phishing attacks disguised as legitimate Google Play Store pages. It uses an inaudible audio loop for persistence, functions as a banking trojan, and includes a cryptocurrency miner. It creates deceptive overlays for platforms like Binance and Trust Wallet to divert funds and can monitor web browsers and execute remote commands. - TaxiSpy RAT: Exploits accessibility services to gather sensitive information such as SMS messages and call logs, targeting banking and cryptocurrency applications with overlays for credential theft. It employs advanced evasion techniques like native library encryption and real-time remote control. - Mirax: A private malware-as-a-service (MaaS) offering with a subscription model that provides tools for banking overlays and information gathering, including keystrokes and SMS. - Oblivion: Another Android RAT available at a competitive price, featuring capabilities to bypass security measures on various devices. - SURXRAT: Distributed through a Telegram-based MaaS ecosystem, it uses accessibility permissions for persistent control and communicates with a Firebase-based command-and-control infrastructure. Some samples incorporate a large language model component, indicating experimentation with AI by threat actors.
Search