Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





 
Welcome Guest!
Welcome to the Promo2day Community, where we feature software giveaways, computer discussion, along with a fun, safe atmosphere! If your reading this it means you are not yet registered. You will need to Register before you can make posts, chat or enter the forum giveaways. Be sure to also visit the Help/FAQ page.

  Kontakt Player 7 - PRISM DRUMS Lite Edition [PC,Mac]
Posted by: ahmed - 02-23-2024 , 10:54 AM - Forum: External Giveaways/Freebies - No Replies

[Image: 2024-02-23-155009.jpg]

A collection of curated mix-ready drum samples designed for today's modern productions. 6 drum kits into 1 instrument : Modern Pop drum kit, Retro Pop Drum kit, Trailer kit, Indie Pop kit, Hip-hop kit and Lofi Kit.Compatible with the FREE Kontakt player (version 7). Fully NKS compatible.

Curated and mix-ready samples
Stop browsing through drum libraries and spend more time creating with curated, mix-ready drum kits designed by industry leading sound designer.

Built-in drum FX
Finding your sound is fast and simple using our built-in effects feature. Designed to deliver studio-quality drum tracks with no alterations.

For Kontakt Player
NI’s Native Kontrol Standard allows this instrument to work seamlessly with Komplete Kontrol keyboards and Maschine, letting you access snapshots and quickly dive into sound design with custom mapped control knobs.

Compatible with the FREE Kontakt player (version 7.2+)

Visit:
https://avamusicgroup.com/products/free-...um-library
https://www.pluginboutique.com/product/1...te-Edition

Print this item

  Falco Runner Letters [PC Game]
Posted by: ahmed - 02-23-2024 , 09:44 AM - Forum: Game Giveaway of the Day - No Replies

[Image: 4b7d41311d10dcf307320de4eea5a51d.jpeg]

An interesting casual game that will help you improve your typing skills. 
Falco Runner Letters is an interesting casual game that will also help you improve your typing skills. The game is a five-lane runner, where to move along the lines you need to press the keyboard keys that correspond to the letters on the road in front of you. The more letters you can collect, the more score you will have! The game gets faster with each level, which means collecting all the letters will no longer be so easy! What level can you reach? 

System Requirements:
Windows

Homepage:
https://vls-sergey.itch.io/falco-runner-letters

GP:
https://game.giveawayoftheday.com/falco-runner-letters/

Print this item

  Coolmuster Word to PDF Converter [for PC]
Posted by: ahmed - 02-23-2024 , 09:42 AM - Forum: External Giveaways/Freebies - Replies (1)

[Image: coolmuster-word-to-pdf-converter-giveaway-free.png]

Coolmuster Word to PDF Converter can convert Word docs to PDF without losing the quality and ensuring the security of your documents. You can use it to customize your PDF output, including page type, page size, document margins, and output folder. The batch conversions function is best handled by this dedicated converter, you can use this function for batch processing to time-saving.

Key Features

  • Coolmuster Word to PDF Converter is a powerful Word to PDF converter tool that allows you to convert your docx files into professional-quality PDFs.
  • This tool also helps you protect your sensitive information while converting docx to PDF as well as customize your PDF output, including page size, document margins, and output folder.
  • It provides the batch conversion function to help you convert multiple documents at the same time.
  • This tool has a user-friendly interface and provides friendly customer support, regular updates, and is compatible with docx files, making it the ideal tool for converting Word docs to PDF files.
Supported OS: 
Windows 11/10/8/7

Homepage:
https://www.coolmuster.com/

GP:
https://www.coolmuster.com/giveaway/word...erter.html

Terms & Conditions:
  • This is a 1-year license
  • Non-commercial usage
  • No free updates and tech support
  • Register before Feb 27, 2024

Print this item

  exFAT Drive Not Mounting/Showing up on Mac, What do Do?
Posted by: joy2u - 02-23-2024 , 08:39 AM - Forum: Guides, Tips & Tricks - No Replies

Quote:

Many users have reported experiencing issues regarding exFAT drives, such as exFAT drive not mounting on Mac or exFAT not showing up on Mac. The former is easier to deal with as the exFAT drive is at least detected by your Mac and is usually free of physical damage. However, the latter is more complex. It could be a serious hardware problem or a simple configuration issue.

Here, we'll discuss these two problems in detail and help you mount exFAT on Mac.

Guide to fixing exFAT not working on Mac:

1. Recover data from an exFAT drive that's not mounting on Mac
2. Why is your exFAT drive not mounting on Mac?
3. How to fix exFAT drive not mounting on Mac?
4. How to fix exFAT not showing up on Mac?
5. Final thoughts on using exFAT on Mac
6. FAQs about exFAT drive not mounting on Mac

Continue reading here:
How to Fix exFAT Drive Not Mounting/Showing Up on Mac

Print this item

  FTC to ban Avast from selling browsing data for advertising purposes
Posted by: mrtrout - 02-22-2024 , 11:26 PM - Forum: Security News - Replies (1)

https://www.bleepingcomputer.com/news/se...-purposes/  FTC to ban Avast from selling browsing data for advertising purposes
By Sergiu Gatlan
February 22, 2024 11:48 AM      The U.S. Federal Trade Commission (FTC) will order Avast to pay $16.5 million and ban the company from selling the users' web browsing data or licensing it for advertising purposes.

The complaint says Avast violated millions of consumers' rights by collecting, storing, and selling their browsing data without their knowledge and consent while misleading them that the products used to harvest their data would block online tracking.

"While the FTC's privacy lawsuits routinely take on firms that misrepresent their data practices, Avast's decision to expressly market its products as safeguarding people's browsing records and protecting data from tracking only to then sell those records is especially galling," said FTC Chair Lina M. Khan.

"Moreover, the volume of data Avast released is staggering: the complaint alleges that by 2020 Jumpshot had amassed "more than eight petabytes of browsing information dating back to 2014."

More specifically, the FTC says UK-based company Avast Limited harvested consumers' web browsing information without their knowledge or consent using Avast browser extensions and antivirus software since at least 2014.

Avast data feeds included unique identifiers for each web browser and a combination of info on every website visited, timestamps, type of device and browser, as well as the users' city, state, and country. When describing its data-sharing practices, the company also falsely claimed it would only transfer the users' personal information in an aggregate and anonymous form.

The FTC also said Avast stored this information indefinitely and sold it to over 100 third parties between 2014 and 2020 through their Jumpshot subsidiary.

For instance, Jumpshot made an agreement with advertising company Omnicom, which allowed it to access 50% of Jumpshot's customer data from six countries: the United States, the United Kingdom, Mexico, Australia, Canada, and Germany, as alleged in the complaint.

Avast also purportedly misled users by promising to protect their privacy by blocking third-party tracking. However, it failed to inform them that their detailed, re-identifiable browsing data would be sold.

The company's data harvesting practices were exposed in December 2019 after Mozilla pulled four of the company's browser extensions (i.e., Avast Online Security, Avast SafePrice, AVG Online Security, and AVG SafePrice) from its Firefox addon repository after receiving reports that they were tracking users' web browsing.

A Motherboard / PCMag joint investigation found one month later that Avast's Jumpshot subsidiary was selling the browsing data collected from customers to third parties, including the Omnicom data broker named in FTC's complaint.

FTC Avast

Besides being ordered to pay $16.5 million, Avast will be prohibited from licensing or selling any browsing data collected using Avast-branded products to third parties for advertising purposes.

The company will have to obtain consent from all customers before selling or licensing browsing data obtained from non-Avast products. The FTC will also require Avast to delete all web browsing data shared with Jumpshot and any products or algorithms developed by Jumpshot using said data.

Furthermore, Avast will have to notify users whose browsing data was sold to third parties without their consent about the FTC's actions against the company.

"Avast promised users that its products would protect the privacy of their browsing data but delivered the opposite. Avast's bait-and-switch surveillance tactics compromised consumers' privacy and broke the law," said Samuel Levine, the head of the FTC's Bureau of Consumer Protection.

An Avast spokesperson told BleepingComputer that the company has already reached a settlement with the FTC to resolve the investigation regarding the data shared with the Jumpshot subsidiary that was shut down in January 2020.

"We are committed to our mission of protecting and empowering people’s digital lives," the spokesperson said.

"While we disagree with the FTC’s allegation and characterization of the facts, we are pleased to resolve this matter and look forward to continuing to serve our millions of customers around the world."

Update February 22, 11:57 EST: Added Avast's statement.        www.bleepingcomputer.com  Trend Micro ID Protection  Safe 
No suspicious content, malicious code, or phishing threats were found on this webpage.      https://opentip.kaspersky.com/https%3A%2...tab=lookup    Report
Report for web address
https://www.bleepingcomputer.com/news/se...-purposes/
Good
Overview
IPv4 count ≈ 519
Files count —
Created
25 Jan, 2004
17:00
Expires
25 Jan, 2027
17:00
Domain bleepingcomputer.com
Registration organization —
Registrar name GoDaddy.com, LLC    Kaspersky  Threat Intelligence Portal

Print this item

  FliFlik Watermark Remover [for PC]
Posted by: ahmed - 02-22-2024 , 09:33 AM - Forum: External Giveaways/Freebies - No Replies

[Image: JCg3FAo.jpg]

FliFlik Watermark Remover has the flexibility to manually remove various types of watermarks using modes such as texture repair, edge filling, and smooth filling. Whether it’s a logo, text, data stamp, or location in the photo, this watermark remover can eliminate them effortlessly. Alternatively, leverage AI technology for a quick one-click removal process.

Key Features:

  • FliFlik Watermark Remover is designed to help you easily remove watermarks with its powerful AI algorithm.
  • This tool allows you to embed a watermark to prove ownership and prevent unauthorized downloads.
  • FliFlik’s smart AI object removal erases the unwanted objects and people in your photo and produces high-quality pictures without imperfection.
  • This application also allows you to remove background to make you a clean product, brand picture, etc.
  • Moreover, you’re able to import different image formats such as JPG, JPEG, PNG, BMP, TIFF, TIF, and more.
Supported OS:
Windows 7, 8/8.1, 10, 11 64-bit

Homepage:
https://fliflik.com/

GP:
https://fliflik.com/giveaway/

Terms & Conditions
-This is a 1-computer 6-month license for noncommercial use
-You get free updates for six months
-You do not get free tech support
-You must redeem the license key before this offer has ended

Print this item

  Dark Illusion 2 [PC Game]
Posted by: ahmed - 02-22-2024 , 09:24 AM - Forum: Game Giveaway of the Day - No Replies



Assemble the picture correctly using the elements that you find.
The second part of the game Dark Illusion, where you again have to explore 10 more levels, each of which consists of 20 unique elements. Your task is to assemble the picture correctly using the elements that you find. After a successful build, a button opens that allows you to move to the next level. The difficulty of the game is above average.

System Requirements:
Windows

Homepage:
https://readel.itch.io/dark-illusion-2-2024

GP:
https://game.giveawayoftheday.com/dark-illusion-2/

Print this item

  Apeaksoft Video Fixer 1.0.10 [for PC]
Posted by: ahmed - 02-22-2024 , 09:21 AM - Forum: Giveaway of the day - No Replies

[Image: jjikqau.jpg]

Fix broken videos to normal.
Apeaksoft Video Fixer is a lightweight and easy-to-use video repairing tool that can help you fix broken videos to normal in seconds. Powered by AI, this software can repair videos for you automatically as long as you correctly add the corrupted video and sample video.

Key functions and features:
- Repair damaged, corrupted, unplayable videos in MP4, MOV, AVI, 3GP formats.
- Support HD, 4K, 8K video input.
- Repair videos shot by different devices, including cameras, smart phones, GoPro, DJI Drone, etc.
- Preview the repaired video before exporting.
- Success rate high to 99.99%.

System Requirements:
Windows 7/ 8/ 8.1/ 10/ 11

Homepage:
https://www.apeaksoft.com/video-fixer/

Licence details:
Annual

GP:
https://www.giveawayoftheday.com/apeakso...er-1-0-10/

Register:
https://www.apeaksoft.com/special/gotd/video-fixer/

You have to install and activate it on 22nd February, 2024 before the Giveaway offer for the software is over. After you have successfully registered, please do not register it again or reinstall it, otherwise the registered version would be turned into trial version.

Terms and conditions:
Please note that the software you download and install during the Giveaway period comes with the following important limitations:
1) No free technical support
2) No free upgrades to future versions
3) Strictly non-commercial usage
4) One year license
4) No support for resetting the free registration code

Print this item

  Vovsoft XLS to CSV Converter [for PC]
Posted by: ahmed - 02-22-2024 , 06:57 AM - Forum: External Giveaways/Freebies - No Replies

[Image: xls-to-csv-converter.png?v=1.5]

Vovsoft XLS to CSV Converter is a minimalist and user-friendly software that can help you convert multiple Excel spreadsheets to CSV files with only a few mouse clicks. This utility can batch convert chunks of Excel documents in bulk.

A comma-separated values (CSV) file is a delimited text file that uses a comma to separate values. Each line of the file is a data record. Each record consists of one or more fields, separated by commas. Designed with simplicity in mind, this XLS to CSV convertor software can only perform one task: that of extracting the contents from the input Excel (XLSX or XLS) files, then transfer them to newly created CSV files. In other words, you just have to select the input Microsoft Excel files and choose a folder to export them to CSV format, all with just a few clicks.

The main window is neatly organized and straightforward, and you can add one or several files by dragging and dropping them onto the dedicated section. Alternatively, you can manually browse to their folder and add them separately, which can come in handy if they are stored in different locations. You can switch to a different encoding from the list of compatible ones (ANSI, UTF-8, UTF-8-BOM, UTF-16 BE BOM, UTF-16 LE BOM) if you come across any errors during the conversion process. This software makes it possible for you to change the default separator to a symbol of your choosing, such as comma or semicolon.The best part of the program is that the conversion is done completely offline. You are the only controller of your private data. No XLS, XLSX or CSV document is sent to internet in any case.

System Requirements:
Supports Windows 11, Windows 10, Windows 8/8.1, Windows 7, Windows Vista, Windows XP (32-bit & 64-bit) 

Homepage:
https://vovsoft.com/

Version:
1.5

License:
Lifetime

GP:
https://vovsoft.com/giveaway/free-xls-to...rter-2024/

License:


► Campaign Start: February 18, 2024
► Campaign End: February 25, 2024

Print this item

  Audials Music 2024 [30 License]
Posted by: ahmed - 02-22-2024 , 06:13 AM - Forum: External Giveaways/Contests - No Replies

[Image: sCJa6UM.jpg]

Enjoy your music collection everywhere!
Get music in MP3, WMA or AAC file format legally and free of charge. Audials Music is the fastest option of downloading directly with video-to-audio conversion from well-known audio and video portals. Top hits and new charts every week. With the new version, you can easily import and export playlists and you will get your music in an even higher quality! 

System Requirements:
Windows 7/ 8/ 10/ 11; 1 GHz CPU; 1 GB hard drive space; 1 GB RAM; DSL internet access

Homepage:
https://audials.com/en/music/audials-music

Licence details:
Lifetime

Enter:
https://www.giveawayoftheday.com/audials-music-2024/

(4 Days remaining from now!)

Print this item

  Ransomware: the most high-profile attacks of 2023 Kaspersky Blog
Posted by: mrtrout - 02-20-2024 , 11:59 PM - Forum: Security News - No Replies

https://www.kaspersky.com/blog/ransowmar...023/50634/    Ransomware: the most high-profile attacks of 2023
A look at the biggest ransomware attacks of 2023.


Alanna Titterington

February 20, 2024    Time was when any ransomware incident would spark a lively press and public reaction. Fast forward to the present, and the word “ransomware” in a headline doesn’t generate nearly as much interest: such attacks have become commonplace. Nonetheless, they continue to pose a grave threat to corporate security. This review spotlights the biggest and most high-profile incidents that occurred in 2023.

January 2023: LockBit attack on the UK’s Royal Mail
The year kicked off with the LockBit group attacking Royal Mail, the UK’s national postal service. The attack paralyzed international mail delivery, leaving millions of letters and parcels stuck in the company’s system. On top of that, the parcel tracking website, online payment system, and several other services were also crippled; and at the Royal Mail distribution center in Northern Ireland, printers began spewing out copies of the LockBit group’s distinctive orange ransom note.  As is commonly the case with modern ransomware attacks, LockBit threatened to post stolen data online unless the ransom was paid. Royal Mail refused to pay up, so the data ended up being published.

February 2023: ESXiArgs attacks VMware ESXi servers worldwide
February saw a massive automated ESXiArgs ransomware attack on organizations through the RCE vulnerability CVE-2021-21974 in VMware ESXi servers. Although VMware released a patch for this vulnerability back in early 2021, the attack left more than 3000 VMware ESXi servers encrypted.

The attack operators demanded just over 2BTC (around $45,000 at the time of the attack). For each individual victim they generated a new Bitcoin wallet and put its address in the ransom note.    Just days after the attack began, the cybercriminals unleashed a new strain of the cryptomalware, making it far harder to recover encrypted virtual machines. To make their activities more difficult to trace, they also stopped giving out ransom wallet addresses, prompting victims to make contact through the P2P messenger Tox instead.

March 2023: Clop group widely exploits a zero-day in GoAnywhere MFT
In March 2023, the Clop group began widely exploiting a zero-day vulnerability in Fortra’s GoAnywhere MFT (managed file transfer) tool. Clop is well-known for its penchant for exploiting vulnerabilities in such services: in 2020–2021, the group attacked organizations through a hole in Accelon FTA, switching in late 2021 to exploiting a vulnerability in SolarWinds Serv-U.

In total, more than 100 organizations suffered attacks on vulnerable GoAnywhere MFT servers, including Procter & Gamble, the City of Toronto, and Community Health Systems — one of the largest healthcare providers in the U.S.

Map of Fortra GoAnywhere MFT servers accessible online
Map of GoAnywhere MFT servers connected to the internet. Source

April 2023: NCR Aloha POS terminals disabled by BlackCat attack
In April, the ALPHV group (aka BlackCat —  after the ransomware it uses) attacked NCR, a U.S. manufacturer and servicer of ATMs, barcode readers, payment terminals, and other retail and banking equipment.

The ransomware attack shut down the data centers handling the Aloha POS platform — which is used in restaurants, primarily fast food — for several days.

NCR Aloha POS platform
NCR Aloha POS platform disabled by the ALPHV/BlackCat group. Source

Essentially, the platform is a one-stop shop for managing catering operations: from processing payments, taking online orders, and operating a loyalty program, to managing the preparation of dishes in the kitchen and payroll accounting. As a result of the ransomware attack on NCR, many catering establishments were forced to revert to pen and paper.

May 2023: Royal ransomware attack on the City of Dallas
Early May saw a ransomware attack on municipal services in Dallas, Texas — the ninth most populous city in the U.S. Most affected were IT systems and communications of the Dallas Police Department, and printers on the City of Dallas network began churning out ransom notes.

Royal ransomware extorts the City of Dallas
The Royal ransom note printed out through City of Dallas network printers. Source

Later that month, there was another ransomware attack on an urban municipality: the target this time was the City of Augusta in the U.S. state of Georgia, and the perpetrators were the BlackByte group.

June 2023: Clop group launches massive attacks through zero-days in MOVEit Transfer
In June, the same Clop group responsible for the February attacks on Fortra GoAnywhere MFT began exploiting a zero-day vulnerability in another managed file transfer tool — Progress Software’s MOVEit Transfer.

This ransomware attack — one of the largest incidents of the year — affected numerous organizations, including the oil company Shell, the New York City Department of Education, the BBC media corporation, the British pharmacy chain Boots, the Irish airline Aer Lingus, the University of Georgia, and the German printing equipment manufacturer Heidelberger Druckmaschinen.

Clop demands a ransom
The Clop website instructs affected companies to contact the group for negotiations. Source

July 2023: University of Hawaii pays ransom to the NoEscape group
In July, the University of Hawaii admitted to paying off ransomwarers. The incident itself occurred a month earlier when all eyes were fixed on the attacks on MOVEit. During that time, a relatively new group going by the name of NoEscape infected one of the university departments, Hawaiian Community College, with ransomware.

Having stolen 65GB of data, the attackers threatened the university with publication. The personal information of 28,000 people was apparently at risk of compromise. It was this fact that convinced the university to pay the ransom to the extortionists.

NoEscape ransomware attack on the University of Hawaii
NoEscape announces the hack of the University of Hawaii on its website. Source

Of note is that university staff had to temporarily shut down IT systems to stop the ransomware from spreading. Although the NoEscape group supplied a decryption key upon payment of the ransom, the restoration of the IT infrastructure was expected to take two months.

August 2023: Rhysida targets the healthcare sector
August was marked by a series of attacks by the Rhysida ransomware group on the healthcare sector. Prospect Medical Holdings (PMH), which operates 16 hospitals and 165 clinics across several American states, was the organization that suffered the most.

The hackers claimed to have stolen 1TB of corporate documents and a 1.3 TB SQL database containing 500,000 social security numbers, passports, driver’s licenses, patient medical records, as well as financial and legal documents. The cybercriminals demanded a 50BTC ransom (then around $1.3 million).

Rhysida demands a ransom
Ransom note from the Rhysida group. Source

September 2023: BlackCat attacks Caesars and MGM casinos
In early September, news broke of a ransomware attack on two of the biggest U.S. hotel and casino chains — Caesars and MGM — in one stroke. Behind the attacks was the ALPHV/BlackCat group, mentioned above in connection with the assault on the NCR Aloha POS platform.

The incident shut down the companies’ entire infrastructure — from hotel check-in systems to slot machines. Interestingly, the victims responded in very different ways. Caesars decided to pay the extortionists $15 million, half of the original $30 million demand.

MGM chose not to pay up, but rather to restore the infrastructure on its own. The recovery process took nine days, during which time the company lost $100 million (its own estimate), of which $10 million was direct costs related to restoring the downed IT systems.

BlackCat ransomware attacks on Caesars and MGM
Caesars and MGM own more than half of Las Vegas casinos

October 2023: BianLian group extorts Air Canada
A month later, the BianLian group targeted Canada’s flag carrier, Air Canada. The attackers claim they stole more than 210GB of various information, including employee/supplier data and confidential documents. In particular, the attackers managed to steal information on technical violations and security issues of the airline.

BianLian extorts Air Canada
The BianLian website demands a ransom from Air Canada Source

November 2023: LockBit group exploits Citrix Bleed vulnerability
November was remembered for a Citrix Bleed vulnerability exploited by the LockBit group, which we also discussed above. Although patches for this vulnerability were published a month earlier, at the time of the large-scale attack more than 10,000 publicly accessible servers remained vulnerable. This is what the LockBit ransomware took advantage of to breach the systems of several major companies, steal data, and encrypt files.

Among the big-name victims was Boeing, whose stolen data the attackers ended up publishing without waiting for the ransom to be paid. The ransomware also hit the Industrial and Commercial Bank of China (ICBC), the largest commercial bank in the world.

LockBit extorts Boeing
The LockBit website demands a ransom from Boeing

The incident badly hurt the Australian arm of DP World, a major UAE-based logistics company that operates dozens of ports and container terminals worldwide. The attack on DP World Australia’s IT systems massively disrupted its logistics operations, leaving some 30,000 containers stranded in Australian ports.

December 2023: ALPHV/BlackCat infrastructure seized by law enforcement
Toward the end of the year, a joint operation by the FBI, the U.S. Department of Justice, Europol, and law enforcement agencies of several European countries deprived the ALPHV/BlackCat ransomware group of control over its infrastructure. Having hacked it, they quietly observed the cybercriminals’ actions for several months, collecting data decryption keys and aiding BlackCat victims.

In this way, the agencies rid more than 500 organizations worldwide of the ransom threat and saved around $68 million in potential payouts. This was followed in December by a final takeover of the servers, putting an end to BlackCat’s operations.

The end of ALPHV/BlackCat activity
The joint law enforcement operation to seize ALPHV/BlackCat infrastructure. Source

Various statistics about the ransomware group’s operations were also made public. According to the FBI, during the two years of its activity, ALPHV/BlackCat breached more than a thousand organizations, demanded a total of more than $500 million from victims, and received around $300 million in ransom payments.

How to guard against ransomware attacks
Ransomware attacks are becoming more varied and sophisticated with each passing year, so there isn’t (and can’t be) one killer catch-all tip to prevent incidents. Defense measures must be comprehensive. Focus on the following tasks:

Train employees in cybersecurity awareness.
Implement and refine data storage and employee access
Back up important data regularly and isolate it from the network.
Install robust protection on all corporate devices.
Monitor suspicious activity on the corporate network using an Endpoint Detection and Response (EDR)
Outsource threat search and response to a specialist company if your in-house information security lacks the capability.     https://opentip.kaspersky.com/https%3A%2...tab=lookup    Report
Report for web address
https://www.kaspersky.com/blog/ransowmar...023/50634/
Good
Overview
IPv4 count ≈ 1,000
Files count —
Created
8 Oct, 1997
17:00
Expires
6 Oct, 2024
18:00
Domain kaspersky.com
Registration organization Joint Stock Company Kaspersky Lab
Registrar name Regional Network Information Center, JSC dba RU-CENTER    Kaspersky Threat Intelligence Portal

Print this item

  United States Sanctions Affiliates of Russia-Based LockBit Ransomware Group
Posted by: mrtrout - 02-20-2024 , 08:43 PM - Forum: Security News - No Replies

https://home.treasury.gov/news/press-releases/jy2114      United States Sanctions Affiliates of Russia-Based LockBit Ransomware Group
February 20, 2024
The United States imposes sanctions on affiliates of group responsible for ransomware attacks on the U.S. financial sector

WASHINGTON — Today, the United States is designating two individuals who are affiliates of the Russia-based ransomware group LockBit. This action is the first in an ongoing collaborative effort with the U.S. Department of Justice, Federal Bureau of Investigation, and our international partners targeting LockBit.

“The United States will not tolerate attempts to extort and steal from our citizens and institutions,” said Deputy Secretary of the Treasury Wally Adeyemo. “We will continue our whole-of-government approach to defend against malicious cyber activities, and will use all available tools to hold the actors that enable these threats accountable.”

Russia continues to offer safe harbor for cybercriminals where groups such as LockBit are free to launch ransomware attacks against the United States, its allies, and partners. These ransomware attacks have targeted critical infrastructure, including hospitals, schools, and financial institutions. Notably, LockBit was responsible for the November 2023 ransomware attack against the Industrial and Commercial Bank of China’s (ICBC) U.S. broker-dealer. The United States is a global leader in the fight against cybercrime and is committed to using all available authorities and tools to defend Americans from cyber threats. In addition to the actions announced today, the U.S. government provides critical resources to support potential victims in protecting against and responding to ransomware attacks. For example, last year, the Cybersecurity & Infrastructure Security Agency in conjunction with other U.S. Departments and Agencies and foreign partners published two cybersecurity advisories, “Understanding Ransomware Threat Actors: LockBit” and “LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability.” These advisories detail the threats posed by this group and provide recommendations to reduce the likelihood and impact of future ransomware incidents.

This action follows other recent actions taken by the U.S. against Russian cybercriminals, including the recent trilateral designation of Alexander Ermakov, a Russian national involved in the 2022 ransomware attack against Medibank Private Limited, in coordination with Australia and the United Kingdom and last year’s bilateral sanctions actions against the Trickbot Cybercrime Group with the United Kingdom. Russia has enabled ransomware attacks by cultivating and co-opting criminal hackers. Treasury has previously stressed that Russia must take concrete steps to prevent cyber criminals from freely operating in its jurisdiction. Today’s actions reflect the United States’ commitment to combatting cybercrime and pursuing the bad actors that target victims across the United States, its allies, and its partners.

LOCKBIT: A MALICIOUS RUSSIAN RANSOMWARE GROUP
LockBit is a Russia-based ransomware group first observed in 2019 and best known for its ransomware variant of the same name. LockBit operates on a Ransomware-as-a-Service (RaaS) model, where the group licenses its ransomware software to affiliated cybercriminals in exchange for a percentage of the paid ransoms. LockBit is known for its double extortion tactics, where its cybercriminals exfiltrate vast amounts of data from its victims before encrypting the victim’s computer systems and demanding ransom payments. LockBit was the most deployed ransomware variant globally in 2022 and remains prolific today. 

OFAC’s investigation identified LockBit as responsible for the ransomware attack on ICBC, which occurred on November 9, 2023. The ransomware attack disrupted ICBC’s U.S. broker-dealer, affecting the settlement of over $9 billion worth of assets backed by Treasury securities. The ransomware attack caused a blackout of ICBC’s computer systems, resulting in a loss of e-mail and communications. ICBC’s inability to access its systems caused securities to be delivered for settlement with no funds backing the trades.

OFAC TARGETS AFFILIATES OF LOCKBIT RANSOMWARE GROUP
Ivan Gennadievich Kondratiev, a Russian national located in Novomokovsk, Russia, is a LockBit affiliate and leader of the LockBit affiliate sub-group, the National Hazard Society. Kondratiev is commonly known in the cybercriminal world as “Bassterlord” and “Fisheye,” and he also has ties to REvil, RansomEXX and Avaddon ransomware groups. Kondratiev has actively engaged in LockBit ransomware attacks. 

Artur Sungatov, a Russian national, is a Lockbit ransomware group affiliate and has actively engaged in LockBit ransomware attacks.

OFAC is designating each of these individuals pursuant to Executive Order (E.O.) 13694, as amended by E.O. 13757, for being responsible for or complicit in, or having engaged in, directly or indirectly, an activity described in subsection (a)(ii)(D) of section 1 of E.O. 13694, as amended.

SANCTIONS IMPLICATIONS
As a result of today’s action, all property and interests in property of the designated persons described above that are in the United States or in the possession or control of U.S. persons are blocked and must be reported to OFAC. In addition, any entities that are owned, directly or indirectly, individually or in the aggregate, 50 percent or more by one or more blocked persons are also blocked. Unless authorized by a general or specific license issued by OFAC, or exempt, OFAC’s regulations generally prohibit all transactions by U.S. persons or within (or transiting) the United States that involve any property or interests in property of designated or otherwise blocked persons. In addition, persons that engage in certain transactions with the individuals designated today may themselves be exposed to designation.

The power and integrity of OFAC sanctions derive not only from its ability to designate and add persons to the Specially Designated Nationals and Blocked Persons (SDN) List but also from its willingness to remove persons from the SDN List consistent with the law. The ultimate goal of sanctions is not to punish but to bring about a positive change in behavior. For information concerning the process for seeking removal from an OFAC list, including the SDN List, please refer to OFAC’s Frequently Asked Question 897 here. For detailed information on the process to submit a request for removal from an OFAC sanctions list, please click here.

See OFAC’s Updated Advisory on Potential Sanctions Risk for Facilitating Ransomware Payments for information on the actions that OFAC would consider to be mitigating factors in any related enforcement action involving ransomware payments with a potential sanctions risk. For information on complying with sanctions applicable to virtual currency, see OFAC’s Sanctions Compliance Guidance for the Virtual Currency Industry.

For more information on the individuals designated today, click here.

###
https://safeweb.norton.com/report?url=ht...s%2Fjy2114    Report
home.treasury.gov

URL Analysed: https://home.treasury.gov/news/press-releases/jy2114


NORTON RATING

Safe

Norton Safe Web has analyzed home.treasury.gov for safety and security problems.

Print this item

  ThunderSoft Private Secure Disk [for PC]
Posted by: Igoreha - 02-20-2024 , 12:59 PM - Forum: External Giveaways/Freebies - Replies (1)

[Image: thundersoft-private-secure-disk-giveaway-key-free.png]

ThunderSoft Private Secure Disk is an encryption software that offers file and folder encryption capabilities for contemporary Windows versions. This tool comes with a function that enables you to establish a virtual disk on either your computer or USB drive, providing a secure space for your personal and sensitive data. This ensures that access to your information is effectively blocked without the correct password.

Key Features:

  • ThunderSoft Private Secure Disk allows you to create a virtual disk to hide your personal data in a Windows File.
  • Your sensitive or confidential information will stored and hidden from prying eyes.
  • It also uses the advanced encryption method to encrypt data by setting the password for each file and folder.
  • With double password protection, you can protect USB & external drives, CD & DVD media, and Email attachments.

Supported OS: 
Windows 7, 8/8.1, 10, and 11 (32-bit and 64-bit)

Homepage:
http://www.thundershare.net/

Giveaway:
https://giveaway.tickcoupon.com/thunders...-free-key/
https://winningpc.com/thundersoft-privat...-free-key/

Terms & Conditions:
  • This is a 1-computer lifetime license
  • No free updates
  • No free tech support
  • You must redeem the license key before this offer has ended
  • May not be resold

**Post edited by ahmed.fixed posting template,added more information ...

Print this item

  Bitdefender Total Security (5 Devices 1 Year) for USD 24.95
Posted by: Daniel_R - 02-20-2024 , 08:35 AM - Forum: Hot Deals & Discounts - No Replies

Get 74% OFF on Bitdefender Total Security (5 Devices 1 Year)

OFFER LINK
https://www.dealarious.com/coupon/bitdef...ti-device/

Print this item

  Kaspersky Standard Tested 2.8.24 Computer Solutions
Posted by: mrtrout - 02-19-2024 , 08:57 PM - Forum: Video Reviews - No Replies

https://www.youtube.com/watch?v=B_cWvYoPzfU      Kaspersky Standard Tested 2.8.24
Computer Solutions
5.41K subscribers
562 views  5 days ago  #internetsecurity #kaspersky #antivirus
Kaspersky Standard Tested 2.8.24        
https://safeweb.norton.com/report?url=ht...0%20%20%20    Report
youtube.com/watch

URL Analysed: https://www.youtube.com/watch?v=B_cWvYoPzfU


NORTON RATING

Safe

Norton Safe Web has analyzed youtube.com/watch for safety and security problems.

Print this item

  XMedia Recode 3.5.9.0 & Portable XMedia Recode 3.5.9.0 Freeware
Posted by: mrtrout - 02-19-2024 , 06:55 AM - Forum: Freeware - No Replies

https://www.xmedia-recode.de/en/index.php  Latest news 18.02.2024

XMedia Recode 3.5.9.0

    Update of ffmpeg
    Update of AOM AV1 (3.8.1) Codec
    Update of vpx (1.14.0) Codec      XMedia Recode supports AMD, Nvidia and Intel hardware accelerated video conversion.

XMedia Recode can only convert unprotected DVDs.

XMedia Recode converts:

3GP to AVI, 3GP to FLV, 3GP to MP4, 3GP to MKV, 3GP to MOV, 3GP to WebM,
AAC to AC3, AAC to Flac, AAC to MP3, AAC to Opus, AAC to Vorbis, AAC to WAV,
AC3 to AAC, AC3 to MP3, AC3 to Flac, AC3 to Opus, AC3 to Vorbis, AC3 to WAV,
ASF to 3GP, ASF to FLV, ASF to MP4, ASF to MKV, ASF to OGM, ASF to WebM,
AVI to 3GP, AVI to FLV, AVI to MP4, AVI to MKV, AVI to OGM, AVI to WebM,
DVD to 3GP, DVD to AC3, DVD to AVI, DVD to MP3, DVD to MP4, DVD to MOV,
DVD to SVCD, DVD to VCD, DVD to WMV,
FLV to 3GP, FLV to AVI, FLV to MKV, FLV to MP4,FLV to MOV,  FLV to Mp3, FLV to WebM,
MP2 to AAC, MP2 to AC3, MP2 to Flac, MP2 to MP3, MP2 to Opus, MP2 to Vorbis, MP2 to WAV,
MP3 to AAC, MP3 to AC3,MP3 to Flac, MP3 to MP2, MP3 to Opus, MP3 to Vorbis, MP3 to WAV,
MP4 to AVI, MP4 to FLV, MP4 to MKV, MP4 to MOV, MP4 to OGM, MP4 to WebM,
MOV to 3GP, MOV to AVI, MOV to FLV, MOV to MP4, MOV to OGM, MOV to WebM,
MKV to 3GP, MKV to AVI, MKV to FLV, MKV to MP4, MKV to MOV, MKV to OGM,
MKV to WebM,
Speex to AAC, Speex to AC3, Speex to MP2, Speex to MP3, Speex to Opus, Speex to Vorbis,
WMA to AAC, WMA to AC3, WMA to MP2,WMA to MP3, WMV to Opus, WMA to Vorbis,
WAV to AAC, WAV to AC3, WAV to MP2, WAV to MP3, WAV to Opus, WAV to Vorbis,
WebM to AVI, WebM to MP4, WebM to MKV, WebM to MOV, WebM to OGM
System Requirements

    Processor: Intel / AMD compatible at 1 GHz or higher
    RAM: 1 GBx
    Windows 7, 8, 8.1, 10, 11
    DirectX: DirectX 9
https://www.xmedia-recode.de/en/download.php    XMedia Recode (64 bit) Installer
Version: 3.5.9.0 Release notes
Language: Chinese Simplified, Chinese Traditional, Czech, Dutch, German, Greek, English, French, Italian, Japanese, Korean, Portuguese, Polish, Russian
Operating systems: Win 7, Win 8, Win 8.1, Win 10, Win 11
File size: 19,6 MB
Software type: Freeware
System Requirements: Microsoft Visual C++ Redistributable 2022 64 bit

Hardware accelerated video conversion:


Nvidia GPU: driver 522.25 or higher

AMD Radeon GPU: Adrenalin Edition 19.7.1 or higher

Intel Skylake CPU or later with Intel HD or Arc graphics

64-Bit-Download  https://www.xmedia-recode.de/download/XM..._setup.exe      XMedia Recode Portable (64 bit)
Version: 3.5.9.0 Release notes
Language: Chinese Simplified, Chinese Traditional, Czech, Dutch, German, Greek, English, French, Italian, Japanese, Korean, Portuguese, Polish, Russian
Operating systems: Win 7, Win 8, Win 8.1, Win 10
File size: 29,8 MB
Software type: Freeware
System Requirements: Microsoft Visual C++ Redistributable 2022 64 bit

Hardware accelerated video conversion:


Nvidia GPU: driver 522.25 or higher

AMD Radeon GPU: Adrenalin Edition 19.7.1 or higher

Intel Skylake CPU or later with Intel HD or Arc graphics

64-Bit-Download  https://www.xmedia-recode.de/download/XM...90_x64.zip      https://opentip.kaspersky.com/https%3A%2...tab=lookup      Report
Report for web address
https://www.xmedia-recode.de/en/index.php
Good
Overview
IPv4 count ≈ 40
Files count —
Created —
Expires —
Domain xmedia-recode.de
Registration organization —
Registrar name —  Kaspersky  Threat Intelligence Portal    XMedia Recode 3.5.9.0  &  Portable XMedia Recode 3.5.9.0 Freeware  is 100% CLEAN, which means it does not contain any form of malware,
including adware, spyware, viruses, trojans and backdoors.  Was 100% Scanned Malware Free & Clean & Safe With Kaspersky Standard 2024    XMedia Recode  Application Reputation Trusted (Kaspersky Security Network ) Digital Signature: Sebastian Dörfler  Sign Date: 2024-02-18 12:19 PM

Print this item

  Notepad++ v8.6.3 & Portable Notepad++ v8.6.3
Posted by: mrtrout - 02-19-2024 , 06:38 AM - Forum: Freeware - No Replies

https://notepad-plus-plus.org/news/v863-released/    Notepad++ v8.6.3 release

2024-02-18

We recognize that not every user loves the multi-editing feature. In this release, we’ve added GUI options to disable the “Column To Multi-editing” feature, and even the “Multi-editing” feature can be turned off completely. Additionally, users can disable the “copy/cut line while no selection” feature through the preferences dialog.

Furthermore, in the new release We’ve addressed a performance issue related to “Replace all” and fixed the critical problem where all open files were lost after restarting as an administrator.    https://notepad-plus-plus.org/downloads/v8.6.3/    Release Date: 2024-02-18
Download 64-bit x64  Installer  https://github.com/notepad-plus-plus/not...er.x64.exe    Portable (7z)  https://github.com/notepad-plus-plus/not...ble.x64.7z      https://opentip.kaspersky.com/https%3A%2...tab=lookup    Report
Report for domain
https://notepad-plus-plus.org/
Good
Summary
IPv4 count 1,000
File count ≈ 1,000
URL count ≈ 1,000
Hits ≈ 1,000,000
Created 28 May, 2010
Expires 28 May, 2024
Domain notepad-plus-plus.org
Registration organization Domains By Proxy, LLC
Registrar name Wild West Domains, LLC  Kaspersky Threat Intelligence Portal  Notepad ++ a free (GNU) source code editor Application Reputation  Trusted (Kaspersky Security Network )  Digital Signature: Notepad ++ Sign Date: 2024-02-16 8:56 PM    Notepad++ v8.6.3 & Portable  Notepad++ v8.6.3 is 100% CLEAN, which means it does not contain any form of malware,
including adware, spyware, viruses, trojans and backdoors.  Was 100% Scanned Malware Free & Clean & Safe With Kaspersky Standard 2024

Print this item

  Hacker arrested for selling bank accounts of US, Canadian users
Posted by: mrtrout - 02-18-2024 , 08:38 PM - Forum: Security News - No Replies

https://www.bleepingcomputer.com/news/se...ian-users/  Hacker arrested for selling bank accounts of US, Canadian users
By Bill Toulas

    February 18, 2024 10:06 AM    Ukraine's cyber police arrested a 31-year-old for running a cybercrime operation that gained access to bank accounts of American and Canadian users and sold it on the dark web.

The suspect distributed trojanized software as free resources using several websites that he administered. He also promoted these sites through advertising campaigns

The police note that the suspect distributed software for both desktop and mobile (Android) operating system.

"To distribute his virus, the hacker created and administered several websites, offering users to download various software for free," reads the police's announcement.

"The suspect launched an entire advertising campaign on the internet to "promote" the controlled web resources."    The payloads infected the victims' devices and siphoned sensitive data to the hacker, who used it to hack into the victim's Google accounts and online banking.

The hacker then sold access to the breached accounts to other cybercriminals over the dark web, arranging payments in Bitcoins after contacting them over the phone using a Russian number.

The Ukrainian authorities say that the suspect had accomplices for this activity, who maintained darknet accounts. Their identities is currently unknown but authorities are looking to learn who they are during the investigation.

The press release from the police also mentions that the hacker has been active since 2017 and pivoted to phishing in 2021. Preliminary details confirmed that the cybercriminal obtained at least $92,000 from his activity, but that figure is likely to be much higher.

The arrest occurred on February 14, at the suspect's home. The police confiscated various items during three separate searches, including a luxury Mercedes-Benz SUV worth around $65,000.    For his criminal activity, the suspect now faces up to 8 years of prison and the confiscation of all property, for violations in the Criminal Code of Ukraine - Part 2 of Article 209 (laundering of property obtained by criminal means), Part 2 of Article 361 (unauthorized interference with the operation of information systems, electronic communication networks), and Part 1 of Article 361-1 (creation for the purpose of illegal use, distribution, or sale of harmful software or technical means, as well as their distribution or sale).

To reduce the risk of malware infections while searching for specific software tools, users should exercise caution with promoted results in Google Search and verify that the loaded site is the official one from the vendor.

It is also a good idea to use an ad-blocker that can automatically hide promoted results on Google Search, safeguarding online activities from malvertising threats.       https://safeweb.norton.com/report?url=ht...n-users%2F    Report

bleepingcomputer.com/news/security/hacker-arrested-for-selling-bank-accounts-of-us-canadian-users

URL Analysed: https://www.bleepingcomputer.com/news/se...ed-for-sel...


Norton Rating

Safe

Norton Safe Web has analyzed bleepingcomputer.com... for safety and security problems.  https://opentip.kaspersky.com/https%3A%2...tab=lookup  Report
Report for web address
https://www.bleepingcomputer.com/news/se...ian-users/
Good
Overview
IPv4 count ≈ 519
Files count —
Created 25 Jan, 2004 17:00
Expires 25 Jan, 2027 17:00
Domain bleepingcomputer.com
Registration organization Domains By Proxy, LLC
Registrar name GoDaddy.com, LLC    Kaspersky Threat Intelligence Portal

Print this item

  SafeInCloud 24.4.4 Freeware New Released
Posted by: mrtrout - 02-18-2024 , 03:04 AM - Forum: Freeware - No Replies

https://safe-in-cloud.com/en/    Password Manager SafeInCloud

SafeInCloud Password Manager allows you to keep your logins, passwords, and other private info safe and secure in an encrypted database. You can synchronize your data with another phone, tablet, Mac or PC via your own cloud account.   
Login with Biometry

You can instantly unlock SafeInCloud with a fingerprint or by face recognition.
Easy to Use

Try it yourself and enjoy an easy-to-use yet powerful user interface.
Free Desktop App

Use a free Desktop application for Windows or Mac OS to access your database on your computer.
Autofill in Apps

You can autofill login and password fields into any app on your phone directly from SafeInCloud. You don't need to copy and paste them manually.
Cloud Synchronization

Sync your data automatically with your own cloud account on Google Drive, Dropbox, OneDrive, or even your own NAS server (via WebDAV).
Password Generator

Generate random, secure, yet memorable passwords with an advanced password generator tool.
Watch App

Keep the most frequently used passwords and PINs on your wrist with Apple Watch and Wear OS companion app.
Download

Password Manager SafeInCloud is available for Android, iOS, Mac, and Windows.
Download: https://safe-in-cloud.com/download/SafeI..._Setup.msi    https://opentip.kaspersky.com/https%3A%2...tab=lookup    Report
Report for web address
https://safe-in-cloud.com/en/
Good
Overview
IPv4 count ≈ 12
Files count —
Created 2 Feb, 2012 16:00
Expires 2 Feb, 2029  17:00
Domain safe-in-cloud.com
Registration organization —
Registrar name GoDaddy.com, LLC    Kaspersky Threat Intelligence Portal    https://opentip.kaspersky.com/59937BB0D4...tab=upload    Dynamic analysis summary

Last scan performed on 17 Feb, 2024 19:54 with an anti-virus databases updated on 17 Feb, 2024 12:24
Detects
0
Total
Malware
0
Adware and other
0
Suspicious activities
4
Total
High
1
Medium
0
Low
3
Extracted files
385
Total
Malware
0
Adware and other
0
Clean
374
Not categorized
11      SafeInCloud Setup Application Reputation  Trusted (Kaspersky Security Network ) Digital Signature: Andrei Shcherbakov  SafeInCloud 24.4.4 Freeware is 100% CLEAN, which means it does not contain any form of malware,
including adware, spyware, viruses, trojans and backdoors.  Was 100% Scanned Malware Free & Clean & Safe With Kaspersky Standard 2024      https://safeweb.norton.com/report?url=ht...n%2F%20%20    Report

safe-in-cloud.com

URL Analysed: https://safe-in-cloud.com/en/


Norton Rating

Safe

Norton Safe Web has analyzed safe-in-cloud.com for safety and security problems.          https://www.mywot.com/scorecard/safe-in-cloud.com    Is safe-in-cloud.com Safe?
Trusted by WOT

Print this item

  Dr.Web Security Space for Android - Free License
Posted by: Igoreha - 02-17-2024 , 08:52 AM - Forum: Android Giveaways - No Replies

Dr.Web Security Space for Android - Free License

Supply conditions
You get a test version of Dr.Web Security Space for Android (beta-license) for free.
The license is valid: from January 30, 2024 to May 1, 2024.
Free updates are available for a license.
Only for personal (non -profit) use.

https://www.comss.ru/page.php?id=13066

Print this item