New malware removal guides

Fake DeepSeek AI Chat Extension
Potentially unwanted application

Fake DeepSeek AI Chat Extension

This extension misleadingly claims to be affiliated with DeepSeek AI, a well-known and reputable service, in an attempt to appear legitimate and trustworthy. It is designed to collect user-inputted data and transmit it to its developers. This creates a privacy concern, as malicious third parties c

Supessherse.co.in Ads
Notification Spam

Supessherse.co.in Ads

Supessherse.co[.]in is a rogue page during a routine investigation of suspect websites. After examining this webpage, we determined that it promotes browser notification spam and produces redirects to different (likely unreliable/harmful sites. The majority of visitors to supessherse.co[.]in and

MultSearch Browser Hijacker
Browser Hijacker

MultSearch Browser Hijacker

During our examination of MultSearch, we learned that it is an extension designed to hijack a web browser by changing its settings. The purpose of this hijacking is to promote oesrchrdr.com, a fake search engine. Users are advised not to trust browser hijackers and the associated search engines.

$TRUMP Token Distribution Scam
Phishing/Scam

$TRUMP Token Distribution Scam

Our researchers discovered this "$TRUMP Token Distribution" scam while investigating suspicious websites. The fake page claims to be distributing Trump tokens. The goal of this scam is to trick users into exposing their digital wallets to a cryptocurrency drainer. IMPORTANT NOTE: We do not r

Searchonsite.com Redirect
Browser Hijacker

Searchonsite.com Redirect

Our analysis of searchonsite.com has revealed that it is a fake search engine promoted through an unwanted browser extension (a browser hijacker) known as SearchOnSite. The site itself does not generate search results, and the extension associated with it appears to offer no real value to users. T

Top malware removal guides

We Hacked Your System Email Scam
Phishing/Scam

We Hacked Your System Email Scam

After reading this "We Hacked Your System" email, we determined that it is spam, specifically – a sextortion scam email. This message threatens to leak an explicit video of the recipient to their contacts unless the blackmailer is paid. It must be emphasized that all the claims in this message a

Server (IMAP) Session Authentication Email Scam
Phishing/Scam

Server (IMAP) Session Authentication Email Scam

Our inspection of the "Server (IMAP) Session Authentication" email revealed that it is spam. This fake message states that access to the recipient's email account has been restricted due to detected irregular activity. The goal is to trick users into disclosing their account log-in credentials (pa

Internet Fraudsters Arrested Email Scam
Phishing/Scam

Internet Fraudsters Arrested Email Scam

After reading this "Internet Fraudsters Arrested", we determined that it is fake. This spam letter states that online scammers who had previously defrauded the recipient have been arrested, and the courts have ordered the Spanish government to compensate them two million euros. It must be emphasi

Service Update Notification Email Scam
Phishing/Scam

Service Update Notification Email Scam

Our examination of the "Service Update Notification" email revealed that it is spam. This message claims that a mail server update has to be implemented within 24 hours. The spam mail aims to deceive recipients into disclosing their email account log-in credentials to a phishing website. T

Mailbox Failed To Sync Email Scam
Phishing/Scam

Mailbox Failed To Sync Email Scam

We have inspected the email and discovered that it is a fraudulent message posing as a notification from an email service provider. It contains a link to a fake site designed to steal personal information. Thus, we classified it as a phishing email. Recipients should ignore and delete it.

Cyber Security News

The Double Life Of EncryptHub Revealed
Date

The Double Life Of EncryptHub Revealed

A new report published by Outpost24 and written by Kraken Labs unveils the double life lived by up-and-coming threat actor EncryptHub, who has been linked to the breaching of 618 organizations to deploy ransomware and info stealers. The part-time threat actor is believed to have also reported two vu

Crocodilus Malware Steals Crypto Wallet Keys
Date

Crocodilus Malware Steals Crypto Wallet Keys

Android users have long been the target of sophisticated banking trojan malware families. Some of the most prevalent threats, which have seen constant development and evolution, are Anatsa, Hook, and Octo. In a recent report by Threat Fabric, a new malware strain, Crocodilus, can be added to that li

VanHelsing Ransomware Comes To Encrypt Data
Date

VanHelsing Ransomware Comes To Encrypt Data

Security firm Cyfirma has recently discovered a new ransomware-as-a-service (RaaS) called VanHelsing. Once a name given to mythical slayers of Vampires, VanHelsing is now attached to a criminal enterprise designed to siphon a business' lifeblood in return for decrypting data, which the threat actors

Top Antivirus Apps

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner Anti-Malware (for Windows computers)

Combo Cleaner is an anti-malware application for Windows computers (also available for Mac computers). It's developed by a company RCS LT which has been working in cyber security industry for over 10 years. The accumulated experience in internet security allowed us to create a robust anti-malware so

Download
Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

Combo Cleaner is an antivirus and system optimizer created by a company called RCS LT. This application runs on Mac computers and works with all recent Mac operating systems, including Yosemite, macOS 13 Ventura, and macOS 14 Sonoma. This application takes a different approach as compared to tradit

Download
Malwarebytes Premium

Malwarebytes Premium

Over the years, signature-based malware detection has proven vulnerable to abuse by malware developers. Good companies will quickly adapt to new malware versions, creating new and better signatures for malware detection. However, there is still a time delay between discovery and detection. Behavi