w

"We all tried to avoid that clash..": Ajay Devgn on Singham Again locking horns with Bhool Bhulaiyaa 3

Ajay Devgn and Rohit Shetty have spoken about why the release date of Singham Again couldn't be changed despite clash with Bhool Bhulaiyaa 3.




w

Sonnalli Seygall shares pregnancy diet secret: "Ghee made from cow urine and dung"

Sonnalli Seygall has revealed how she has been having a special 'pregnancy ghee' made from cow dung, cow urine and milk.




w

Varun Dhawan's 'heart sank' when he saw Samantha use oxygen tank, collapse during Citadel: Hunny Bunny shoot

Varun Dhawan has recalled the two instances when his heart sank seeing Samantha Ruth Prabhu using oxygen, collapsing on the sets of Citadel: Hunny Bunny




w

Veteran south Indian actor Delhi Ganesh passes away

Veteran south Indian actor Delhi Ganesh, known for his memorable roles in Tamil, Malayalam, Telugu, and Kannada cinema, is no more.




w

Malaika Arora's November challenge after split with Arjun Kapoor: No alcohol, remove toxic people

Malaika Arora has penned down some big challenges for herself for the month of November. Let's take a look.




w

Narayan Murthy forgot his 25th wedding anniversary; Sudha doesn't cook: Couple share heartiest moments on Kapil Sharma show

On Saturday's episode co-founder of Infosys Narayana Murthy and his wife Sudha Murthy, Zomato CEO Deepinder Goyal and his wife Grecia Munoz graced the Kapil Sharma show. The couple delighted the viewers with their charming personalities and candid stories.




w

Neetu Kapoor, Riddhima groove to Bobby Deol's song Jamal Kudu from Animal; fans ask 'Where is Ranbir, Alia, Raha?'

Taking to her Instagram handle, Riddhima Kapoor shared glimpses from her Saturday night party, where she was seen dancing Jamal Kudu song, which is from Ranbir Kapoor's film. Her mother Neetu Kapoor also joined her.




w

Kiara Advani Wears Rohit Bal Ensemble For Game Changers Promotion; Netizens Find It Disrespectful

Numerous Bollywood celebrities have paid tribute to the iconic Rohit Bal after his death by wearing outfits that he had designed, however, netizens definitely did not like Kiara's tribute to the designer




w

Alia Bhatt To Star In Kalki 2898 AD Director Nag Ashwin's Next: Here's What We Know

Based on speculation, Alia Bhatt might be in talks with Nag Ashwin for a female-centric film.




w

MrBeast & Logan Paul in Mumbai: Saif Ali Khan fulfils Jeh wish; Kareena Kapoor, Taimur, Malaika Arora, Arhaan pose with global stars

A video shows Saif Ali Khan carrying his son Jeh on his shoulders, while Taimur sits next to Kareena at a nearby table. Both Taimur and Jeh wore matching caps, while Kareena Kapoor and Saif Ali Khan twinned in black outfits. When the anchor asked who would like a picture with Logan Paul, Jeh raised his hand.




w

Vaani Kapoor, Fawad Khan wrap up London Schedule of 'Abir Gulaal'

The London schedule of Indian actress Vaani Kapoor and Pakistani actor Fawad Khan's upcoming romantic comedy "Abir Gulaal" has wrapped up.




w

Get Joy to Enjoy Dazzling Taj Mahal Tour with Tiger Safari

If you visit this country first time, then read this article completely because it will help you to guide about Indian tourism. Visitors from all over the globe come here and feel their dreams come true, here you can explore the...




w

Weekend Getaway to the Land Of Strawberry : Mahabaleshwar

Being a travel enthusiast, planning aholiday to me is to first scan the days on which the major occasions(birthdays/anniversary) falls. Fortunately, this year it was all the 3 major occasionsfalling over weekends. Could not have asked...




w

Travel around the soil of Immense warriors in Rajasthan

Culture is another name of Rajasthan and famous for their festivals and traditional fairs. While you are exploring this state where golden sand dune desert exist. So the desert may offer a magical view of sandy vastness that spread miles...




w

Walk around the natural charm of the Taj

Every visitor thinks about the Taj Mahal when they make any trip to India. Regularly considered to be one of the seventh wonder of the world, Taj Mahal should be explored by all visitors at least once in the whole life. About this...




w

Delhi tours are always gratifying and appealing

 

Delhi is the capital city of India: it is bound to be influential, just not by power by its huge prolonged historical facts and cultures. Delhi is a city that...




w

See the Top Sights of India with Golden Triangle Tour

India is a natural, magical and beautiful country. Here you can explore the various kinds of natural and man made places such as forts, palaces, lakes, hills, backwater, beaches, mountains, temples etc. This country is rich in tradition,...




w

Know the Story of Taj Mahal and Get Rejoice with its Beauty

All around the world, not a single festival that can match the joyful celebrations of India’s fair and festivals. Here you can experience the ultimate fun with melodious legends, joyous fairs, frolicsome festival, adventure...




w

women only tour in India is completely safe with us

Now global times allow you make a women only tour in India to have some fun with without any restriction and enjoy their liberty .In old era,women were mainly  as homemakers and just that but now days, times are...




w

Halloween custom ideas

I had to say time flies, it is Halloween again. It seems it is not long from the Halloween’s day of 2012. Today is just the Halloween of 2013. Have you prepared for it? If you still do not have any idea about the...




w

Nvidia surpasses Apple to become world's largest company in AI era

Graphics chip giant Nvidia has become the world's largest company by market capitalisation, surpassing Apple, in the artificial intelligence (AI) era.




w

Domestic air passenger traffic in India sees 6.3 pc growth at 138.5 lakh in Oct

The domestic air passenger traffic reached 138.5 lakh in October, higher by 6.3 per cent in comparison to 130.3 lakh in the previous month, according to a report on Thursday.




w

Tepid response to Swiggy IPO continues, 35 pc subscription on Day 2

Swiggy IPO continued to see a tepid response from investors on the second day of bidding on Thursday. The Rs 11,327 crore IPO was subscribed 0.35 times or 35 per cent on the second day.




w

LIC's new premiums surge by 22.5 pc to Rs 1.33 lakh crore in current fiscal year

Life Insurance Corporation of India (LIC), the country's largest insurer, has achieved a 22.52 per cent increase in new business premiums at Rs 1,32,680.98 crore during the first seven months of FY25, compared to the corresponding figure of Rs 1,08,289.78 crore in the same period of the previous fiscal year, data showed on Monday.




w

Trojan.PS1.POWLOAD.JKP

Threat type: Trojan

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This POWLOAD variant is seen distributed via spam. The spam campaign is in Italian and lures users to click by using COVID-19 in its subject.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Trojan.Win32.MOOZ.THCCABO

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Backdoor.Win32.DEVILSHADOW.THEAABO

Threat type: Backdoor

Aliases: Trojan.Win32.Scar.sydj (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




w

IoT.Linux.MIRAI.VWISI

Threat type: Backdoor

Aliases:

Platforms: Unix

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This new Mirai variant exploits CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers. Similar to earlier variants, this Mirai variant uses telnet and SSH brute-forcing techniques to attack vulnerable devices.

This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Ransom.Win32.BABUK.THAODBA

Threat type: Ransomware

Aliases: Trojan.Win32.Udochka.kb (KASPERSKY); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Ransom.Win32.MAOLOA.THAAHBA

Threat type: Ransomware

Aliases: HEUR:Backdoor.Win32.Remcos.gen(KASPERSKY); W32/Remcos!tr.bdr(FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Ransom.Win32.BABUK.YEBA-THAAEBA

Threat type: Ransomware

Aliases: Ransom:Win32/BabukLocker.MK!MTB (MICROSOFT); Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Trojan.Win64.COMBACKER.YABA-A

Threat type: Trojan

Aliases: Trojan.Win64.Agent (IKARUS), Trojan:Win64/Comebacker.A!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

PUA.Win64.ProcHack.AC

Threat type: Potentially Unwanted Application

Aliases: HEUR:RiskTool.Win32.ProcHack.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Trojan.Win64.HAFNIUM.A

Threat type: Trojan

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Ransom.Win32.DEARCRY.THCABBA

Threat type: Ransomware

Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Ransom.Win64.ASTROLOCKER.THCBDBA

Threat type: Ransomware

Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Ransom.Win32.ASTROLOCKER.A

Threat type: Ransomware

Aliases: BScope.TrojanRansom.Encoder (VBA32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Trojan.Win32.CVE20188120.E

Threat type: Trojan

Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




w

Trojan.Win32.CVE20190808.A

Threat type: Trojan

Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




w

Ransom.Win32.SODINOKIBI.YABGC

Threat type: Ransomware

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Ransom.Win32.BLACKMATTER.THGOCBA

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Ransom.Win32.LOCKBIT.YEBGW

Threat type: Ransomware

Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Trojan.W97M.CVE202140444.A

Threat type: Trojan

Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




w

Trojan.MSIL.WHISPERGATE.YXCAQ

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.I!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Trojan.Win32.WHISPERGATE.YXCAX

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.




w

Trojan.Win32.KILLMBR.YECCA

Threat type: Trojan

Aliases: Win32/KillMBR.NHQ trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Worm.Win32.HERMWIZ.YECCA

Threat type: Worm

Aliases: DoS:Win32/FoxBlade.A!dha (MICROSOFT); Win32/Agent.OJC worm (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: High

Reported Infection: Low

Information Exposure: Low

Overview:

This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




w

Ransom.Win32.LOCKBIT.YXCGD

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter(IKARUS), Ransom:Win32/Lockbit.STB(MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




w

Ransom.Win64.DONOTRUN.A

Threat type: Ransomware

Aliases: Python/Filecoder.EK trojan, Python/Filecoder.EK trojan (NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware locks the user out of their devices by locking the screen.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




w

Ransom.Win32.RTMCOMMAND.THKBFBD

Threat type: Ransomware

Aliases: Ransom:Win32/RTMLocker.AA!MTB

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware encrypts all drives except the CD-ROM.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.