log out

Tech Optimizer
March 27, 2026
A deceptive website impersonating Avast antivirus tricks users into downloading Venom Stealer malware, which steals passwords, session cookies, and cryptocurrency wallet information. The site conducts a fake virus scan, falsely reporting threats to encourage users to download a malicious file named Avastsystemcleaner.exe. This file mimics legitimate software and operates stealthily, targeting web browsers to harvest credentials and session cookies. It also captures screenshots and sends stolen data to the command-and-control domain app-metrics-cdn[.]com via unencrypted HTTP. The malware employs evasion techniques to avoid detection and is part of a long-standing cybercrime tactic that exploits user trust in security software. Indicators of compromise include the file hash SHA-256: ecbeaa13921dbad8028d29534c3878503f45a82a09cf27857fa4335bd1c9286d, the domain app-metrics-cdn[.]com, and the network indicator 104.21.14.89.
AppWizard
July 16, 2025
Transferring files between a Pop!OS Linux desktop and an Android device can be done using a tool named Packet, which utilizes Quick Share for file transfers over the same wireless network. To install Packet, the Linux distribution must support Flatpak applications, Bluetooth must be enabled, and the Android device should run a version of Android that includes Nearby Share. User privileges with sudo access are required for installation. The installation involves executing a command in the terminal and optionally logging out and back in. Users need to enable the Static Network Port in Packet's Preferences and open port 9300 on the firewall using the command PLACEHOLDER74f5483d2fa9d11c for successful file transfers. Files received are stored in the ~/Downloads folder, which can be customized in the Preferences settings.
Search