New malware removal guides

Pocamish.com Ads
Notification Spam

Pocamish.com Ads

We have reviewed pocamish[.]com and found that it uses clickbait to trick visitors into allowing it to display notifications. When unreliable websites have this permission, they exploit it to push scams and similar content. It is highly advisable not to trust websites like pocamish[.]com to avoid

Fortnite Inventory Price Checker Scam
Phishing/Scam

Fortnite Inventory Price Checker Scam

We have inspected the page (fort2026[.]com) and concluded that it is a scam. The site offers users to receive information about the price of their Fortnite inventory. However, its real purpose is to steal personal information that can be used to hijack accounts. Thus, this site should be avoided a

Orionnero.co.in Ads
Notification Spam

Orionnero.co.in Ads

Our examination shows that orionnero.co[.]in is designed to display a deceptive message to persuade visitors to enable its notifications. If the instructions are followed, the site gains permission to send notifications to the device, which may then be used to push potentially harmful content (e.g

TorBrowserTor Ransomware
Ransomware

TorBrowserTor Ransomware

TorBrowserTor is ransomware that we have discovered while analyzing malware samples uploaded to VirusTotal. Once executed, TorBrowserTor encrypts files and appends the ".torbrowsertor" extension to files (e.g., renames "1.jpg" to "1.jpg.torbrowsertor", "2.png" to "2.png.torbrowsertor", etc.). It a

Kobroysimmist.com Ads
Notification Spam

Kobroysimmist.com Ads

Kobroysimmist[.]com is one of the deceptive websites designed to trick visitors into accepting notifications. Our team has found that notifications from kobroysimmist[.]com often include fake warnings. Interacting with those notifications can expose users to scams and other unwanted content. Thus,

Top malware removal guides

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Mr Beast Giveaway POP-UP Scam
Phishing/Scam

Mr Beast Giveaway POP-UP Scam

"Mr Beast Giveaway scam" refers to a scheme run on various deceptive websites. The scam is presented as a monetary prize giveaway eligible for every subscriber of the MrBeast YouTube channel - who visits the scheme-promoting webpage. This fake giveaway requests users to download/install its spons

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Iranian Threat Actors Deploying Pseudo-Ransomware
Date

Iranian Threat Actors Deploying Pseudo-Ransomware

Iranian threat actors have increasingly adopted ransomware-like tactics. These are not purely criminal enterprises, but instruments of statecraft. Over the past several years, and especially amid escalating geopolitical tensions, these actors have refined a hybrid model, which blends cybercrime tech

The Weaponization Of Surveillance For Cyber-Kinetic Warfare
Date

The Weaponization Of Surveillance For Cyber-Kinetic Warfare

Cyber and kinetic warfare have merged into a new phase. Internet-connected devices, especially IP cameras, are now both intelligence assets and strategic risks. Recent events in the 2026 Middle East conflict show how compromised surveillance, coordinated cyberattacks, and DDoS campaigns are changing

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.