New malware removal guides

EtherRAT Malware
Trojan

EtherRAT Malware

EtherRAT is a remote access Trojan (RAT) that gives attackers remote control over infected devices. It was first discovered in late 2025 and has been used in advanced attacks targeting both Linux and Windows systems. It is known that EtherRAT is now delivered through a fake installer that looks li

Searchscr.com Redirect
Browser Hijacker

Searchscr.com Redirect

We have examined searchscr.com and determined that it is a fake search engine. It can lead users to questionable pages and may be associated with unwanted extensions classified as browser hijackers. Users should use only legitimate search engines to avoid the risks associated with sites like searc

Dinosrchius.com Redirect
Browser Hijacker

Dinosrchius.com Redirect

Our team has tested dinosrchius.com and found that it is a questionable search engine. It means it may generate unwanted, potentially misleading results. It is worth mentioning that such search engines are often pushed through browser hijackers. Users should avoid using dubious search engines and

Xaman Monthly $XRP Release Scam
Phishing/Scam

Xaman Monthly $XRP Release Scam

We have analyzed this scam and found that it involves at least two websites (xamanwallet-token[.]pro and xaman-wallet[.]com). It imitates the original Xaman platform (xaman.app) to appear legitimate. The purpose of this fraudulent scheme is to trick visitors into taking actions that can result in

Top malware removal guides

.Xyz Ransomware
Ransomware

.Xyz Ransomware

.Xyz is a new variant of Jigsaw ransomware. Following infiltration, this ransomware encrypts various files stored on victims' computers. This is achieved using asymmetric cryptography. During encryption, this ransomware appends the name of each encrypted file with a ".xyz" extension and, thus, it

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Snow Malware Turns Microsoft Teams Into An Intrusion Platform
Date

Snow Malware Turns Microsoft Teams Into An Intrusion Platform

Cybercriminals keep showing that the easiest way into an enterprise is often through trust, not software vulnerabilities. Google's Mandiant Team discovered a new threat actor, UNC6692, that proves this point. This group weaponizes Microsoft Teams, abuses helpdesk impersonation, and deploys a custom

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.