New malware removal guides

Torg Stealer
Trojan

Torg Stealer

Torg is an information-stealing malware that grabs data from infected devices. It sends stolen information to attackers using an API system. Torg is sold as part of a malware-as-a-service (MaaS) operation. If Torg is detected on a system, it should be removed as soon as possible. Torg targ

Miolab Stealer (Mac)
Mac Virus

Miolab Stealer (Mac)

Miolab (also known as Nova) is an information stealer targeting macOS users. It is sold to cybercriminals via hacker forums using the Malware-as-a-Service (MaaS) model. Miolab can steal information from cryptocurrency wallet extensions, web browsers, and various managers, and can grab files from

Bear (MedusaLocker) Ransomware
Ransomware

Bear (MedusaLocker) Ransomware

Bear is ransomware from the MedusaLocker family. We have discovered it while examining malware samples uploaded to VirusTotal. When executed, Bear encrypts files and appends its extension. It also changes the desktop wallpaper and creates the "READ_NOTE.html" file, a ransom note. Bear appends the

Orbitboostlabs.com Ads
Notification Spam

Orbitboostlabs.com Ads

Our findings indicate that orbitboostlabs[.]com is a site designed to deceive visitors into enabling notifications. If allowed, it can send fraudulent alerts and deceptive offers that promote unreliable websites. Users should avoid visiting orbitboostlabs[.]com and never allow websites of this kin

Metachainedge.com Ads
Notification Spam

Metachainedge.com Ads

Our analysis has revealed that metachainedge[.]com is one of the numerous websites designed to trick visitors into agreeing to receive notifications. If this page gets this permission, it can send fake alerts, offers, and other misleading content used to promote untrustworthy websites. It is highl

Top malware removal guides

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Ad Block Wonder Adware
Adware

Ad Block Wonder Adware

This browser extension is promoted as a tool for blocking pop-ups and ads on favourite websites. However, we have inspected Ad Block Wonder and found that it has the qualities of adware. Once added, it can show unwanted and annoying advertisements. Thus, it is advisable not to add this extension t

Cyber Security News

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.