New malware removal guides

Photos & Documents Will Be Deleted Email Scam
Phishing/Scam

Photos & Documents Will Be Deleted Email Scam

We have inspected the message and concluded that it is a scam email disguised as a notification from the cloud service provider. It urges recipients to take immediate action to "save" their files. The scammers behind this message seek to trick recipients into opening fake websites and following th

NodeCordRAT Malware
Trojan

NodeCordRAT Malware

NodeCordRAT is a type of malware (a Remote Access Trojan, or RAT) that is distributed by hiding it inside fake npm packages. The RAT uses Discord as a communication channel and enables cybercriminals to control infected devices remotely. It is used mainly to steal information from web browsers and

Aave Asset Recovery Scam
Phishing/Scam

Aave Asset Recovery Scam

While examining suspicious websites, our researchers came across claiming-campaign[.]com, a fraudulent page posing as the official Aave platform. The site falsely claims that users affected by a recent Aave attack can now recover their lost assets by connecting their wallet. In reality, it is a cr

CloudZ RAT
Trojan

CloudZ RAT

CloudZ is a remote access Trojan (RAT). It uses a custom plugin to steal credentials and potentially capture one-time passwords (OTPs). CloudZ also avoids detection by running malicious functions in system memory and checking for debuggers and sandbox environments. The RAT should be removed from i

3Crypt RAT (Mac)
Mac Virus

3Crypt RAT (Mac)

3Crypt RAT is a Remote Access Trojan targeting macOS systems. The moment it executes, it performs thorough profiling of the infected machine - collecting hardware identifiers, reading the device's security settings, mapping the network, and enumerating every running process. It then installs mul

Top malware removal guides

MovieBox Browser Hijacker
Browser Hijacker

MovieBox Browser Hijacker

MovieBox is advertised as an app that allows users to access various movie-related sites directly from a new browser tab. This app changes browser settings to promote a fake search engine (feed.moviebox-online.com) and collects various user-system information. Apps of this type are termed browser

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Elon Musk Giveaway Scam
Phishing/Scam

Elon Musk Giveaway Scam

We have examined the site and found that it is a scam that offers visitors a "bonus" as a lure. Its goal is to trick visitors into taking steps that could result in financial loss and possibly other issues, such as information theft. Thus, it is highly advisable not to trust the sites involved in

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks
Date

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks

The npm ecosystem is facing one of its most aggressive and technically sophisticated supply chain attacks to date. Over the past several months, security researchers have uncovered a sprawling malware campaign known as Shai-Hulud and its newer variant, Mini Shai-Hulud, which compromised hundreds of

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.