Category - News

This category covers the News section of HowToRemove.Guide. We primarily focus on news in the security and anti-malware industry, but not limited to them, as we have recently engaged in broader interests related to browsers, operating systems and their relationship to hardware.

User experience  has become a driving factor on the internet, merging areas which were once clearly separated. A prime subject in this is the intersection between the user privacy we all covet and how new features introduced to safeguard that privacy can be exploited by malware creators.


In a technological world of rapid change, we at HowToRemove.Guide need to be fully aware of how that world changes to ensure we can be at the driving edge of knowledge on what malware creators can use against every day users.

And the first step to that is to be constantly informed of all coming changes.


Cyber Security Weekly Recap (27.Feb-05.March)

Billions of IoT and business devices are in danger from new flaws in the TPM 2.0 library. Two critical vulnerabilities (tracked as CVE-2023-1017 and CVE-2023-1018) in the Trusted Platform Module (TPM) 2.0 reference library specification have been...


Cyber Security Weekly Recap (20-26.Feb)

Apple Issues Security Alert for Three New Flaws in iOS and macOS New vulnerabilities affecting iOS, iPadOS, and macOS have been added to Apple’s security advisories from last month. CVE-2023-23520 is a race condition in the Crash Reporter...


Cyber Security Weekly Recap (13-19.Feb.)

New Zero-Day Vulnerability Found in Apple’s iOS, iPadOS, macOS, and Safari On Monday, Apple released updates for iOS, iPadOS, macOS, and Safari to fix a zero-day vulnerability that the company said was being actively exploited by malicious...


Cyber Security Weekly Recap (06-12 Feb.)

Malware Discovered in PyPI Python Packages Four separate rogue packages (named aptx, bingchilling2, httops, and tkint3rs) have been found in the Python Package Index (PyPI). The detected threats have been linked to malicious activities like malware...


Cyber Security Weekly Recap (30 Jan.-05 Feb.)

Recent Ransomware Attacks on ESXi Servers Take Advantage of a VMware Flaw A new wave of attacks is aimed at deploying ransomware on VMware ESXi hypervisors. The French Computer Emergency Response Team (CERT) issued an alert saying, that the attack...


Cyber Security Weekly Recap (16-22.Jan)

A Backdoor backdoor that borrows features of the CIA’s Hive Malware has been found in the wild. A new backdoor that takes its features from the Hive multi-platform malware suite developed by the United States Central Intelligence Agency...


Cyber Security Weekly Recap (09-15 Jan.)

Kubernetes Clusters Affected by the Kinsing Cryptomalware The malicious actor who runs the Kinsing cryptojacking operation has been seen leveraging misconfigured and unprotected PostgreSQL servers in an attempt to get early access to Kubernetes...


Cyber Security Weekly Recap (12-18 Dec.)

Linux Users Affected by CHAOS Malware, an Attack Vector for Cryptocurrency Mining An open-source remote access trojan (RAT) called CHAOS is used in cryptocurrency mining attacks against the Linux operating system. After being installed, the CHAOS...


Cyber Security Weekly Recap (05-11 Dec.)

A SiriusXM flaw allows hackers to remotely unlock and start vulnerable vehicles Researchers in the field of cyber security have uncovered a flaw in the SiriusXM vehicle service that leaves Honda, Nissan, Infiniti, and Acura vehicles vulnerable to...


Cyber security weekly recap (28 Nov. – 04 Dec.)

A Cross-Tenant Vulnerability in Amazon Web Services AppSync has been resolved. A cross-tenant vulnerability that could be exploited by an attacker to gain access to resources has been patched by Amazon Web Services (AWS). This vulnerability is a...