New malware removal guides

ShadeStager Stealer (Mac)
Mac Virus

ShadeStager Stealer (Mac)

ShadeStager is an information-stealing malware designed to gather data from infected macOS devices. This malware primarily targets systems used by software developers and organizations that use cloud services. If detected on a device, ShadeStager should be eliminated as soon as possible to preve

Phoenix Worm Backdoor (Mac)
Mac Virus

Phoenix Worm Backdoor (Mac)

Phoenix Worm is malware written in the Go programming language. It is designed to function as an initial-stage component in an infection chain. Its primary purpose is to quietly infiltrate a system, establish persistence, and prepare the system for the deployment of additional malware later. If

Pointgrowthlab.com Ads
Notification Spam

Pointgrowthlab.com Ads

Our analysis has revealed that pointgrowthlab[.]com uses a deceptive technique to trick visitors into following the presented steps. If visitors do so, they allow the site to send notifications to their devices. Once permission is given, pointgrowthlab[.]com can promote scams and other untrustwort

Vile Ransomware
Ransomware

Vile Ransomware

Vile is ransomware that we discovered during an inspection of samples uploaded to VirusTotal. After execution, this ransomware encrypts files and provides a ransom note ("VILE_README.txt"). It also displays a pop-up message and appends the ".vile" extension to files. For instance, it renames "1.jp

Unusual Spam Activity Email Scam
Phishing/Scam

Unusual Spam Activity Email Scam

We have reviewed the email and found that it is designed to appear as a security notification from the email provider. In reality, this is a scam email that provides a link to a fake website designed to trick visitors into entering personal information. Victims of this scam may lose access to pers

Top malware removal guides

.Xyz Ransomware
Ransomware

.Xyz Ransomware

.Xyz is a new variant of Jigsaw ransomware. Following infiltration, this ransomware encrypts various files stored on victims' computers. This is achieved using asymmetric cryptography. During encryption, this ransomware appends the name of each encrypted file with a ".xyz" extension and, thus, it

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Snow Malware Turns Microsoft Teams Into An Intrusion Platform
Date

Snow Malware Turns Microsoft Teams Into An Intrusion Platform

Cybercriminals keep showing that the easiest way into an enterprise is often through trust, not software vulnerabilities. Google's Mandiant Team discovered a new threat actor, UNC6692, that proves this point. This group weaponizes Microsoft Teams, abuses helpdesk impersonation, and deploys a custom

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.