Ophtek
  • Office IT Services
    • Total IT Coverage
    • Office IT Security
    • HIPAA Compliant IT Services
    • Data Backup and Recovery
    • Office Network
    • Cloud Services for Business
    • Repairs and Support
    • IT Asset Management and Reporting
    • Microsoft 365 Consulting
  • Company
    • About
    • Team
    • Computers 4 Classrooms
  • Contact
  • Blog
  • Client Portal
    • Request Help
Select Page
Vulnerable ASP.NET Keys Used to Unlock PC Security

Vulnerable ASP.NET Keys Used to Unlock PC Security

by Ophtek, LLC | Mar 4, 2025 | ASP.NET keys, malicious code, malicious ViewState, Microsoft, monitor applications, Ophtek, System Updates

Attackers are exploiting exposed ASP.NET keys to inject malicious code into web applications, leading to unauthorized access and potential data breaches. Microsoft has announced that a major security issue has been identified where cybercriminals are taking advantage...
Lazarus Exploits Open-Source Software and Infects it

Lazarus Exploits Open-Source Software and Infects it

by Ophtek, LLC | Feb 25, 2025 | cyberattack, data-stealing malware, Lazarus, North Korea, Ophtek, SecurityScorecard

North Korean hackers from the Lazarus Group have launched a major cyberattack by cloning open-source software and infecting it with malware. A recent cyberattack has found the North Korean hacking group Lazarus targeting software developers by modifying open-source...
Hacker Targets Over 18,000 Script Kiddies with Malware

Hacker Targets Over 18,000 Script Kiddies with Malware

by Ophtek, LLC | Feb 18, 2025 | fake malware builder, Ophtek, Remote Access Trojan, script kiddies, XWorm

A hacker has tricked over 18,000 aspiring cybercriminals into downloading a fake malware builder which secretly infects their computers. Yes, even threat actors can find themselves falling victim to their fellow hackers. In this surprising case, threat actors...
Threat Actors Start Hiding Malware within Website Images

Threat Actors Start Hiding Malware within Website Images

by Ophtek, LLC | Feb 11, 2025 | archive.org, generative AI, malicious code, Obj3tivityStealer, Ophtek, Phishing, VIP Keylogger, website images

Cybercriminals are increasingly embedding malware within website images to evade detection and compromise IT systems. Recent investigations have revealed a growing trend among threat actors: hiding malicious code within image files hosted on trusted websites. This...
Malicious Chrome Extensions Threaten Millions

Malicious Chrome Extensions Threaten Millions

by Ophtek, LLC | Feb 4, 2025 | Bard AI Chat, ChatGPT, Cyber Attack, Facebook Ads, Google Chrome, Google Meet, malware, Ophtek, Phishing

A recent cyberattack has compromised several popular Google Chrome extensions, infecting millions of users with data-stealing malware. In early January 2025, cybersecurity researchers at Extension Total discovered a malicious campaign targeting Chrome extensions which...
Fake Job Scam Used to Serve Up Malware

Fake Job Scam Used to Serve Up Malware

by Ophtek, LLC | Jan 28, 2025 | fake recruiters, Linkedin, malicious websites, Ophtek, phishing_email, update security software, verify identities, webcams

Threat actors are highly innovative – one recent attack tricked victims into addressing fake webcam and microphone issues to gain system access. We’re constantly advised to be aware of phishing emails, infected documents, and malicious websites, but what happens...
« Older Entries
Next Entries »

Latest IT Articles

DanaBot’s Comeback: A New Variant Threatens Windows PCs

DanaBot’s Comeback: A New Variant Threatens Windows PCs

Time Bomb Malware Found in .NET Extensions

Time Bomb Malware Found in .NET Extensions

The Sneaky New Malware That Pretends to Be a Windows Update

The Sneaky New Malware That Pretends to Be a Windows Update

How We Help Businesses

Get the Latest IT News

Success!

Subscribe

  • Follow
  • Follow
  • Follow