New malware removal guides

Cloud Account Scheduled For Deletion Email Scam
Phishing/Scam

Cloud Account Scheduled For Deletion Email Scam

Our analysis indicates that this is a scam email intended to deceive recipients into thinking their cloud account has been scheduled for deletion. It directs users to fraudulent websites. All claims made in the email and on the linked sites are false and should not be trusted. If you receive this

Document Status Update Email Scam
Phishing/Scam

Document Status Update Email Scam

We have reviewed the email and determined that it is a phishing message containing a link to a fake website. The scammers behind this email seek to steal personal information that can be misused to hijack accounts. Stolen accounts can be misused for malicious purposes. Overall, this scam email sho

Draxo Ransomware
Ransomware

Draxo Ransomware

We have examined the malware and found that Draxo is ransomware. Our discovery of this ransomware occurred during an inspection of samples uploaded to VirusTotal. Once launched, Draxo encrypts files and appends four random characters to filenames. For instance, it renames "1.jpg" to "1.jpg.uuwf" a

Your Cloud Account Suspended Email Scam
Phishing/Scam

Your Cloud Account Suspended Email Scam

Our analysis shows that this is a scam email designed to trick recipients into believing that their cloud account has been suspended. It promotes deceptive websites. No claims in this email or the linked scam websites are true, so they should be ignored. If received, this scam email should be dele

Black TENGU Ransomware
Ransomware

Black TENGU Ransomware

Black TENGU is ransomware that our team found while examining samples uploaded to VirusTotal. Once executed, Black TENGU encrypts files and changes their names by appending the ".TENGU" extension. For instance, it renames "1.jpg" to "1.jpg.TENGU" and "2.png" to "2.png.TENGU". Also, Black TENGU cre

Top malware removal guides

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks
Date

The Gentlemen Ransomware Expands With SystemBC Proxy Attacks

Ransomware operators continue to refine their playbooks. The latest evolution of the Gentlemen ransomware shows how fast these groups adapt to scale and stay stealthy. It began as a relatively new ransomware-as-a-service (RaaS) operation in mid-2025. It has already matured into a more dangerous ente

AI-Voice Agents Now Seen Automating Vishing Attacks
Date

AI-Voice Agents Now Seen Automating Vishing Attacks

The emergence of AI-driven cybercrime platforms has fundamentally reshaped the threat landscape. Few developments illustrate this shift more clearly than the ATHR platform and its enablement of Telephone-Oriented Attack Delivery (TOAD) attacks. By combining traditional social engineering with advanc

Iranian Hackers Hunt Vulnerable Industrial Control Systems
Date

Iranian Hackers Hunt Vulnerable Industrial Control Systems

The escalation of Iranian cyber activity targeting critical infrastructure has become a defining feature of the 2026 threat landscape, prompting urgent warnings from U.S. government agencies and cybersecurity firms. Recent joint advisories from the FBI, CISA, NSA, and international partners highligh

Iranian Threat Actors Deploying Pseudo-Ransomware
Date

Iranian Threat Actors Deploying Pseudo-Ransomware

Iranian threat actors have increasingly adopted ransomware-like tactics. These are not purely criminal enterprises, but instruments of statecraft. Over the past several years, and especially amid escalating geopolitical tensions, these actors have refined a hybrid model, which blends cybercrime tech

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.