Latest news with #VirusTotal
Yahoo
27-05-2025
- Business
- Yahoo
Galileo FX Passes Independent Security Audits Across Industry-Leading Platforms
NEW YORK, May 27, 2025 /PRNewswire/ -- Galileo FX, the automated trading software currently used by more than 13,500 traders worldwide, has received clean safety certifications from the web's most respected threat detection systems. As questions around the reliability of trading bots continue to dominate the conversation, Galileo FX's independent verification across major cybersecurity engines signals something rare in this space: a system that holds up under scrutiny. VirusTotal, a platform used by Google and the broader cybersecurity industry, scanned Galileo FX's domain across 97 threat intelligence engines. None flagged it. URLVoid—another aggregation platform pulling data from 39 engines monitoring for malware, phishing attempts, and suspicious behavior—also found no red flags. Norton's SafeWeb analysis confirms the domain is free of any deceptive, harmful, or unwanted activity. What does this mean in practice? For users, it means the software they're downloading and installing isn't just performing in the markets: it's cleared by the same systems that banks, browsers, and antivirus vendors rely on to protect against digital threats. It means the site and the software aren't secretly hiding tracking layers, malware, phishing scripts, or backdoors. And it means users can install and operate Galileo FX with a baseline of technical confidence that most other trading tools never reach. In a category crowded with disposable bots and short-lived projects, a verified clean record implies something more foundational: that the company behind the product took time to build infrastructure that resists not only cyber risks but reputational collapse. Most trading bots won't pass these scans. Galileo FX does. It's a small but significant detail: often overlooked by users, but never overlooked by search engines, operating systems, or ad networks. It's the difference between operating in plain sight versus being quietly suppressed by automated trust systems. This verified trust profile is part of a broader pattern. Galileo FX operates without venture backing or affiliate programs. Its performance results are made public through third-party verification. And its growing base of global users continues to apply its pre-built strategies (some conservative, some aggressive) with clear visibility into risk and reward. These strategies are updated weekly, tested on live markets, and are available for download. For verification details and performance data, visit: View original content: SOURCE Galileo FX Sign in to access your portfolio
Yahoo
22-04-2025
- Yahoo
Ransomware Gang Takes Page From Elon's 'What Did You Do This Week' DOGE Emails
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing. A ransomware gang is channeling Elon Musk's Department of Government Efficiency by taunting victims with ransom notes that demand to know what they've "accomplished for work" in the last week. The FOG ransomware group has been distributing the DOGE-themed notes in recent weeks, according to malware samples that cybersecurity vendor Trend Micro discovered on the file-scanning service VirusTotal. 'We observed that these samples initially dropped a note containing key names related to the Department of Government Efficiency (DOGE),' Trend Micro says. The ransom notes also allude to Edward Coristine, who uses the online alias 'Big Balls." He reportedly has a history with cybercriminal groups, but was still appointed to Musk's DOGE team. A separate cybersecurity firm, Cyble, spotted the same attack generating a pop-up on computers that says 'DOGE BIG BALLS RANSOMWARE.' The FOG ransomware gang appears to be spreading its attack through phishing emails with an attachment titled "Pay If opened, the attachment will download and execute a PowerShell script designed to load the ransomware loader in " along with other malicious programs. "It also opens politically themed YouTube videos and includes written political commentary directly in the script,' Trend Micro notes. The attack is designed to gather data on the victim's PC before encrypting the files, and then leaving a ransom note, demanding the victim pay approximately $1,000 in the Monero cryptocurrency. According to Cyble, the ransom note, titled introduces the threat actor as 'Edward Coristine,' and lists his purported home address and phone number. The note then echoes Elon Musk's recent emails to federal workers and demand that victims justify their productivity by listing their weekly accomplishments. 'Give me five bullet points on what you accomplished for work last week or you owe me a TRILLION dollars,' the ransom note from the FOG gang says. 'The use of Coristine's name and the 'DOGE' reference in the ransomware could be a tactic to malign him and the DOGE initiative,' Cyble adds. In the ransom note, the FOG group also claims they'll decrypt the files for free, but only if the victim spreads the ransomware attack to another victim. 'FOG ransomware is a relatively new ransomware family that enterprises must add to their watchlist,' Trend Micro warns. The gang claims to have attacked over 100 victims, including organizations in the education, manufacturing, and transportation sectors, since January. Meanwhile, the official "what did you do this week" emails from DOGE are reportedly a bust. The Washington Post reports that the Office of Personnel Management basically told HR officials across the government that the emails are voluntary and that the agency didn't plan to do anything with the emails that were submitted.


Shafaq News
07-04-2025
- Shafaq News
Cybersecurity alert: Fraudulent link targets Iraqis' data
Shafaq News/ Iraqi authorities have detected a fraudulent link posted on Facebook, urging citizens not to engage with unknown parties. In a statement on Monday, the Iraqi Ministry of Interior's Cybersecurity Center affirmed that the link, published on the CBI Customer Service Facebook page, aims to collect citizens' data 'illegally' by redirecting users seeking to activate electronic banking services to WhatsApp. The center advised citizens to avoid opening unknown or suspicious links and to verify their authenticity using websites such as VirusTotal before clicking. It also stressed the importance of not sharing personal or banking information online with unknown parties.