New malware removal guides

Kravonexta.com Ads
Notification Spam

Kravonexta.com Ads

Our research team discovered kravonexta[.]com while browsing suspicious websites. This rogue page endorses browser notification spam and generates redirects to other (likely untrustworthy/dangerous) sites. Kravonexta[.]com and webpages akin to it are primarily accessed through redirects produced b

Fake Raydium Staking Website Scam
Phishing/Scam

Fake Raydium Staking Website Scam

While investigating untrustworthy sites, our researchers discovered this fake "Raydium Staking" webpage. The purpose of this Raydium imitator is to deceive users into exposing their digital wallets to a cryptocurrency drainer – a mechanism designed to steal funds from exposed cryptowallets.

Moonbirds ($BIRB) Airdrop Scam
Phishing/Scam

Moonbirds ($BIRB) Airdrop Scam

While investigating suspicious websites, our research team discovered this "Moonbirds ($BIRB) Airdrop" scam. It is disguised as the official BIRB token airdrop. It is in no way associated with the actual Moonbirds (BIRB) site (moonbirds.com). The goal of this scam is to deceive users into exposing

News-rehoga.cc Ads
Notification Spam

News-rehoga.cc Ads

Our investigation of news-rehoga[.]cc revealed that it uses deception to convince users to enable its notifications. If permission is granted, users may receive annoying and intrusive spam alerts, such as fake warnings and advertisements. For this reason, news-rehoga[.]cc should not be trusted and

News-pitaro.com Ads
Notification Spam

News-pitaro.com Ads

News-pitaro[.]com is a rogue webpage that promotes browser notification spam and generates redirects to various (likely unreliable/harmful) sites. Most visitors access this page via redirects produced by websites utilizing rogue advertising networks. In fact, our researchers discovered news-pitaro

Top malware removal guides

Yts.mx Suspicious Website
Adware

Yts.mx Suspicious Website

Yts[.]mx is one of many torrent websites. It is not safe to use these websites to download software, files or other content, since they are often used by cyber criminals to proliferate malicious programs. Furthermore, it is illegal to download copyrighted content via torrent web pages. Research s

PC App Store Unwanted Application
Potentially unwanted application

PC App Store Unwanted Application

PC App Store is a legitimate application that allows easy access to various software vendors. However, while this is a genuine piece of software – there are no guarantees that the content advertised through it will not have undesirable features, such as data tracking. Furthermore, PC App Store

Instagram Password Hacker Scam
Phishing/Scam

Instagram Password Hacker Scam

"Instagram Password Hacker" is a scam run on various deceptive websites. This scheme is presented as a hacking service allowing users to steal Instagram social media accounts by entering their usernames. The aim of "Instagram Password Hacker" is to promote untrustworthy and malicious sites, namel

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Cyber Security News

ChainLeak Vulnerabilities Endangering Cloud Infrastructure
Date

ChainLeak Vulnerabilities Endangering Cloud Infrastructure

In early 2026, security researchers discovered a set of dangerous, wide-reaching vulnerabilities in a widely used open-source AI development framework called Chainlit. These vulnerabilities, collectively dubbed ChainLeak, threatened to expose sensitive data and even allow attackers to breach cloud e

Single Click Copilot Attack Stealing Data
Date

Single Click Copilot Attack Stealing Data

In early January 2026, cybersecurity researchers revealed a serious vulnerability in Microsoft Copilot Personal. This consumer-focused AI assistant is integrated into Windows, the Edge browser, and other applications. The vulnerability, called Reprompt, let attackers bypass built-in safety protectio

Fancy Bear\'s Use Of Credential Theft
Date

Fancy Bear's Use Of Credential Theft

In 2025, the Russian state-sponsored cyber threat actor commonly known as Fancy Bear resurfaced with a refined credential-stealing campaign that demonstrated how simplicity, when paired with precision, can outperform technical complexity. Security researchers at Recorded Future, tracking the a

Kimwolf\'s Rapid Rise To Botnet Supremacy
Date

Kimwolf's Rapid Rise To Botnet Supremacy

In late 2025, cybersecurity researchers began sounding alarm bells over a new threat in the cybercrime landscape named the Kimwolf botnet, an Android-based malware network that has swiftly ballooned into one of the largest active botnets observed over the last few months. Often described as an Andr

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.