New malware removal guides

Sparefastads.top Ads
Notification Spam

Sparefastads.top Ads

While investigating suspicious websites, our researchers discovered the sparefastads[.]top rogue page. It promotes browser notification spam and redirects users to other (likely unreliable/hazardous) sites. Most visitors access sparefastads[.]top and similar webpages via redirects caused by websit

Derenmon.co.in Ads
Notification Spam

Derenmon.co.in Ads

Our researchers found the derenmon.co[.]in rogue page while browsing questionable websites. After examining this webpage, we determined that it is designed to promote browser notification spam and redirect users to other (likely dubious/malicious) sites. Derenmon.co[.]in and similar pages are pri

FMLN Ransomware
Ransomware

FMLN Ransomware

Our researchers discovered the FMLN ransomware while inspecting file submissions to the VirusTotal site. This kind of malware is designed to encrypt data and demand payment for the decryption. On our testing system, FMLN encrypted files and renamed them according to this patten – "[original_fil

TheAnonymousGlobal Ransomware
Ransomware

TheAnonymousGlobal Ransomware

TheAnonymousGlobal is a ransomware-type program. It operates by encrypting data in order to demand payment for its decryption. On our testing system, this ransomware encrypted files and added a ".TheAnonymousGlobal" extension to their titles. To elaborate, a file initially named "1.jpg" appeared

PelDox Ransomware
Ransomware

PelDox Ransomware

Our researchers discovered PelDox ransomware while browsing new file submissions to the VirusTotal website. Malicious software within this classification is designed to encrypt files and demand payment for the decryption. After we launched a sample of PelDox on our test machine, it encrypted file

Top malware removal guides

Clarity Tab Browser Hijacker
Browser Hijacker

Clarity Tab Browser Hijacker

While investigating suspicious websites, our researchers discovered the Clarity Tab browser hijacker. This extension promises to provide new tab widgets (e.g., clock, weather, bookmarks, etc.) and browser wallpapers. However, it changes browser settings to promote (via redirects) a search engine.

Bank Details Email Scam
Phishing/Scam

Bank Details Email Scam

Our inspection of the "Bank Details" email revealed that it is spam. This message claims that the invoice sent by the recipient lacks their company bank details, so the sender asks for this information. This spam mail aims to lure victims into visiting a phishing website that targets email account

Internet Fraudsters Arrested Email Scam
Phishing/Scam

Internet Fraudsters Arrested Email Scam

After reading this "Internet Fraudsters Arrested", we determined that it is fake. This spam letter states that online scammers who had previously defrauded the recipient have been arrested, and the courts have ordered the Spanish government to compensate them two million euros. It must be emphasi

Server (IMAP) Session Authentication Email Scam
Phishing/Scam

Server (IMAP) Session Authentication Email Scam

Our inspection of the "Server (IMAP) Session Authentication" email revealed that it is spam. This fake message states that access to the recipient's email account has been restricted due to detected irregular activity. The goal is to trick users into disclosing their account log-in credentials (pa

Cyber Security News

VanHelsing Ransomware Comes To Encrypt Data
Date

VanHelsing Ransomware Comes To Encrypt Data

Security firm Cyfirma has recently discovered a new ransomware-as-a-service (RaaS) called VanHelsing. Once a name given to mythical slayers of Vampires, VanHelsing is now attached to a criminal enterprise designed to siphon a business' lifeblood in return for decrypting data, which the threat actors

Arcane Stealer Emerges
Date

Arcane Stealer Emerges

In a blog post published by Kaspersky Labs, security researchers revealed the discovery of a new information-stealing malware called Arcane Stealer by the cybersecurity firm. The malware is distributed fairly novel, in that it is distributed via YouTube and videos that provide users with computer ga

Akira Ransomware Bypass EDR Via Unpatched Webcam
Date

Akira Ransomware Bypass EDR Via Unpatched Webcam

In a recent attack by Akira ransomware threat actors, attempts to encrypt data were initially stopped; however, an unpatched webcam proved to be the entry point threat actors were looking for and managed to bypass Endpoint Detection and Response Software installed on the enterprise machines. T

Lazarus Linked To Massive Bybit Crypto Theft
Date

Lazarus Linked To Massive Bybit Crypto Theft

On February 21, 2025, Bybit reported that it had suffered a massive cryptocurrency theft, estimated at 1.46 billion USD using that day's exchange rate. Ethereum (ETH) was stolen from one of its ETH cold wallets, which stores cryptocurrency private keys offline. In practice, private keys are transfe

Black Basta Internal Chat Logs Leaked
Date

Black Basta Internal Chat Logs Leaked

An unknown leaker, going by the alias ExploitedWhispers, has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation. Now removed, the stolen messages were originally uploaded to the MEGA file-sharing platform. Since their removal fro

Top Antivirus Apps

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner is an anti-malware application for Windows computers (also available for Mac computers). It's developed by a company RCS LT which has been working in cyber security industry for over 10 years. The accumulated experience in internet security allowed us to create a robust anti-malware so

Download
Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner is an antivirus and system optimizer created by a company called RCS LT. This application runs on Mac computers and works with all recent Mac operating systems, including Yosemite, macOS 13 Ventura, and macOS 14 Sonoma. This application takes a different approach as compared to traditi

Download
Malwarebytes Premium

Malwarebytes Premium

Over the years, signature-based malware detection has proven vulnerable to abuse by malware developers. Good companies will quickly adapt to new malware versions, creating new and better signatures for malware detection. However, there is still a time delay between discovery and detection. Behavi