New malware removal guides

Power Protocol ($POWER) Airdrop Scam
Phishing/Scam

Power Protocol ($POWER) Airdrop Scam

We have inspected the website (power-protocol[.]org) and found that it promotes a fraudulent "Power Protocol ($POWER) airdrop". It is designed to appear as the original Power Protocol site (powerprotocol.xyz) to trick visitors. The goal is to empty cryptocurrency wallets. Victims of this scam may

Ultimate Stealer (Mac)
Mac Virus

Ultimate Stealer (Mac)

Ultimate is malware designed to steal information from infected macOS systems. It maintains persistence, evades detection, and securely exfiltrates stolen data to a command-and-control (C2) server controlled by cybercriminals. If a device is infected with Ultimate, the malware should be removed

Chase -  Verification To Protect Your Account Email Scam
Phishing/Scam

Chase - Verification To Protect Your Account Email Scam

Our analysis shows that it is a deceptive email disguised as a security alert from the Chase Bank (a legitimate American national bank). It contains fake details to appear urgent and trick recipients into disclosing personal information on a fraudulent page. This scam email should be ignored to av

CrySome RAT
Trojan

CrySome RAT

CrySome is a remote access Trojan (RAT) that lets cybercriminals take control of an infected device. This RAT can steal files and passwords, spy on activity, and run commands remotely. What makes CrySome even more serious threat is that it can hide itself, disable antivirus software, and stay on t

CrystalX RAT
Trojan

CrystalX RAT

CrystalX is a remote access Trojan (RAT) offered as MaaS (malware‑as‑a‑service) and promoted through Telegram. It is mainly used to steal information from infected devices and to control devices remotely, and it also has a prankware capability. If detected on a device, CrystalX should be rem

Top malware removal guides

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Instagram Account Hack Scam
Phishing/Scam

Instagram Account Hack Scam

We have discovered this scheme during an inspection of a PDF file hosted on a dubious page. This scam site is supposed to provide a tool (Hacking Panel V2) for hacking Instagram accounts. Ultimately, users are directed to another web page. It is highly advisable not to trust such schemes to avoid

XMRIG Virus
Adware

XMRIG Virus

XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling". In most cases, "bundling"

Cyber Security News

Iranian Threat Actors Deploying Pseudo-Ransomware
Date

Iranian Threat Actors Deploying Pseudo-Ransomware

Iranian threat actors have increasingly adopted ransomware-like tactics. These are not purely criminal enterprises, but instruments of statecraft. Over the past several years, and especially amid escalating geopolitical tensions, these actors have refined a hybrid model, which blends cybercrime tech

The Weaponization Of Surveillance For Cyber-Kinetic Warfare
Date

The Weaponization Of Surveillance For Cyber-Kinetic Warfare

Cyber and kinetic warfare have merged into a new phase. Internet-connected devices, especially IP cameras, are now both intelligence assets and strategic risks. Recent events in the 2026 Middle East conflict show how compromised surveillance, coordinated cyberattacks, and DDoS campaigns are changing

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.