22 articles Antivirus General Questions

Tips for Installing Padvish on a System with Deep Freeze Software

Issue Faronics Deep Freeze is widely used in organizations with shared systems due to its features. However, installing antivirus software on systems running Deep Freeze presents unique challenges. This guide provides tips and tricks for installing antivirus on such systems. Many software applications, including antivirus, require storing certain information on the host workstation, such as…

Padvish Android Change Log, version 3.16

Version 3.16.19.831 New Features: Added a page that lists the latest program changes. Added a time interval feature for scanning after installation. Added the ability to delete all activity reports.   Bug fixes • Fixed the bug of incomplete display of certain texts in Farsi and English on Android 12 and 13. • Fixed the…

Malicious code embedded in the popular XZ Utils data compression library (CVE-2024-3094)

Vulnerability Assessment ID: CVE-2024-3094 Score: 10 (out of 10) Severity: Critical Attack Vector: Network Attack Complexity: Low Privileges Required: None User Interaction Required: None Attack Scope in case of successful exploit: Entire System Impact on Data Privacy: High Impact on Data Integrity: High Impact on Availability: High   Technical Description: It is under review

Kaspersky Anti-Ransomware False Detection: HEUR:Trojan.Multi.Crypren.gen

Issue You have a server running Kaspersky Anti-Virus, and you have shared several folders. You have installed antivirus or anti-malware on another system in the network. When accessing and editing files in the shared server folder, the connection is lost, and the following log is inserted in Kaspersky Anti-Virus: File Threat Protection – HEUR: Trojan.Multi.Crypren.gen…

Padvish Security Recommendation against ransomware and other cyber threats

INTRODUCTION Padvish Malware and Forensics Analysis Team has published practical security recommendations to combat cyber threats, especially ransomware, based on daily experiences across various networks across the country, based on experiences gained from the real threats that threaten organizations and networks. The purpose of this document is not to provide a comprehensive but very general…