New malware removal guides

Vendor Evaluation Email Scam
Phishing/Scam

Vendor Evaluation Email Scam

After inspecting this email, we determined that it is a phishing scam. The message is disguised as a business invitation to review a Request for Quotation (RFQ), but its real purpose is to send recipients to a fake email login page that steals account credentials. The email should be ignored to av

Search.capredirectapp.com Redirect
Browser Hijacker

Search.capredirectapp.com Redirect

Our researchers investigated Search Control for Chrome and found it to be a browser hijacker. This extension changes the browser's default search engine to search.capredirectapp.com - a fake search engine that cannot generate its own results. Users who have Search Control for Chrome installed are

Jupiter Allocation Scam
Phishing/Scam

Jupiter Allocation Scam

During an investigation of dubious websites, our researchers discovered jupag[.]pro - a page built to mimic the legitimate Jupiter platform. The site falsely claims that visitors have frozen JUP token allocations waiting to be claimed. In reality, it is a cryptocurrency drainer designed to steal d

PhantomCard/NFCShare Banking Trojan (Android)
Other

PhantomCard/NFCShare Banking Trojan (Android)

PhantomCard and NFCShare are two researcher-given names for the same Android banking trojan, which uses NFC relay attacks to steal contactless payment card data and PINs. ThreatFabric named the Brazil-targeting build PhantomCard; D3Lab named the Italy-targeting build NFCShare. Both are regional va

NANOREMOTE Backdoor
Trojan

NANOREMOTE Backdoor

NANOREMOTE is a backdoor - a type of malware that opens a hidden channel on an infected computer so that attackers can issue commands and deliver additional payloads at any time. According to research by Elastic Security Labs, NANOREMOTE is part of the REF7707 threat campaign and is closely relate

Top malware removal guides

MetaMask Email Scam
Phishing/Scam

MetaMask Email Scam

"MetaMask email scam" is a phishing spam campaign. The scam emails are disguised as verification requests from MetaMask - cryptocurrency wallet software interacting with the Ethereum blockchain. It must be emphasized that these letters are fake and in no way associated with ConsenSys Software Inc.

Fake dYdX Trading Platform Scam
Phishing/Scam

Fake dYdX Trading Platform Scam

While investigating suspicious sites, our researchers found this fake "dYdX" webpage. It is a close visual copy of the dYdX decentralized exchange platform (dydx.xyz). Users deceived into connecting their digital wallets to this scam page inadvertently expose them to a cryptocurrency drainer. Vict

Pubads.g.doubleclick.net Virus
Adware

Pubads.g.doubleclick.net Virus

doubleclick.net is a legitimate advertising service provided by Google, however, some cyber criminals use the pubads.g.doubleclick.net site to force users to visit various other adware-type websites. If you encounter these redirects or pop-ups (or other ads) that open with pubads.g.doubleclick.net

TROJAN_2023 And Other Viruses Detected (5) POP-UP Scam
Phishing/Scam

TROJAN_2023 And Other Viruses Detected (5) POP-UP Scam

Our research team found the "TROJAN_2023 And Other Viruses Detected (5)" scam while investigating rogue websites. This scheme falsely claims that the visitor's device is infected with high-risk viruses. While it is disguised as McAfee, this scam is in no way associated with the actual computer sec

Claim $STREAMER Scam
Phishing/Scam

Claim $STREAMER Scam

Our researchers discovered this fake "Claim $STREAMER" site during a routine investigation. It masquerades as the official website of StreamerCoin (streamercoin.live). Upon examination, we determined that this imitator page operates as a cryptocurrency drainer. IMPORTANT NOTE: We do not revi

Cyber Security News

Reaper Variant Of SHub Spoofs Apple Security Updates
Date

Reaper Variant Of SHub Spoofs Apple Security Updates

The operators behind the SHub macOS infostealer have introduced a more sophisticated variant called "Reaper." This shows how macOS-focused malware keeps evolving, moving beyond basic credential theft into persistent, multi-stage compromise operations. The latest campaign blends social engineering,

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks
Date

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks

The npm ecosystem is facing one of its most aggressive and technically sophisticated supply chain attacks to date. Over the past several months, security researchers have uncovered a sprawling malware campaign known as Shai-Hulud and its newer variant, Mini Shai-Hulud, which compromised hundreds of

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.