New malware removal guides

Domain SPF Server Error Email Scam
Phishing/Scam

Domain SPF Server Error Email Scam

Our team has reviewed the email and determined that it is a phishing attempt. It is written by scammers who seek to steal personal information. The goal is to trick recipients into opening a fake website and entering the requested details. Victims of this scam may lose access to personal accounts

Social Security Statement Update Email Virus
Phishing/Scam

Social Security Statement Update Email Virus

We have examined the message and found that cybercriminals are using it to trick recipients into infecting their devices. It is disguised as a "social security statement update" to appear legitimate. This fraudulent email should be ignored to avoid problems like financial loss and identity theft.

LQTOREQ Ransomware
Ransomware

LQTOREQ Ransomware

During our inspection of malware samples uploaded to VirusTotal, we discovered LQTOREQ, which is ransomware designed to encrypt files. Also, LQTOREQ appends the ".lqtoreq" extension to files. For instance, it renames "1.jpg" to "1.jpg.lqtoreq", "2.png" to "2.png.lqtoreq", and so on. Additionally,

cPanel Account Authentication Email Scam
Phishing/Scam

cPanel Account Authentication Email Scam

We have analyzed the message and concluded that it is a phishing attempt. It is disguised as a notification from the email service provider. The purpose of this message is to trick recipients into believing that they have to follow the provided instructions to fix the issue that has supposedly occ

A0Backdoor Malware
Trojan

A0Backdoor Malware

A0Backdoor is a backdoor malware delivered using a malicious DLL sideloading technique. The malware includes anti-sandbox features to evade detection and communicates via a hidden DNS-based command-and-control channel. Having a device infected with A0Backdoor can lead to further infections and ser

Top malware removal guides

.Xyz Ransomware
Ransomware

.Xyz Ransomware

.Xyz is a new variant of Jigsaw ransomware. Following infiltration, this ransomware encrypts various files stored on victims' computers. This is achieved using asymmetric cryptography. During encryption, this ransomware appends the name of each encrypted file with a ".xyz" extension and, thus, it

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks
Date

Shai-Hulud Campaign Marks New Era In Supply Chain Attacks

The npm ecosystem is facing one of its most aggressive and technically sophisticated supply chain attacks to date. Over the past several months, security researchers have uncovered a sprawling malware campaign known as Shai-Hulud and its newer variant, Mini Shai-Hulud, which compromised hundreds of

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.