New malware removal guides

SatoshiVM Distribution Program Scam
Phishing/Scam

SatoshiVM Distribution Program Scam

We have inspected the website (listing-satoshiv.pages[.]dev) and found that it promotes a fake cryptocurrency giveaway to deceive visitors into interacting with it. Its purpose is to lure visitors into connecting their wallets. If scammers succeed, they may empty victims' wallets (steal their cryp

Fake CypherGuard Cryptowallet Recovery Tool Scam
Phishing/Scam

Fake CypherGuard Cryptowallet Recovery Tool Scam

Our examination has revealed that this is a scam website (ledgercryptoservice[.]com) designed to promote a fake cryptocurrency wallet recovery tool. The scammers behind it aim to steal personal information and obtain access to wallets. Falling for this scam can result in financial losses. Users sh

Your Cloud Is Disabled Email Scam
Phishing/Scam

Your Cloud Is Disabled Email Scam

Our team has analyzed this message and determined that it is a scam disguised as a notification from a cloud service regarding account storage. It urges recipients to click a link included in the message. Following the instructions in the email can direct users to deceptive websites. It is recomme

Unibase ($UB) Staking Scam
Phishing/Scam

Unibase ($UB) Staking Scam

We have inspected the site (unlbase[.]app) and found that it mimics the original Unibase platform, unibase.com (the only difference between domain names is the domain extension). The fraudulent version offers rewards as a lure. Its purpose is to steal cryptocurrency from unsuspecting individuals.

PCLocked Ransomware
Ransomware

PCLocked Ransomware

We have discovered PCLocked while inspecting malware samples uploaded to VirusTotal and concluded that it is ransomware. Malware of this type encrypts files and provides a ransom note. PCLocked's ransom note is the "RECOVERY_ID.txt" file. Additionally, it renames encrypted files by appending the "

Top malware removal guides

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Ad Block Wonder Adware
Adware

Ad Block Wonder Adware

This browser extension is promoted as a tool for blocking pop-ups and ads on favourite websites. However, we have inspected Ad Block Wonder and found that it has the qualities of adware. Once added, it can show unwanted and annoying advertisements. Thus, it is advisable not to add this extension t

Search.live-history.com Redirect
Browser Hijacker

Search.live-history.com Redirect

Search.live-history.com is a fake search engine, which we discovered while analyzing the LivingHistory browser hijacker. This software is endorsed as a quick-access tool for the user's browsing history. Browser hijackers modify browsers to produce redirects to their promoted websites, such as sear

Cyber Security News

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Fake Claude Code Installation Guides Deliver Amatera
Date

Fake Claude Code Installation Guides Deliver Amatera

Cybercriminals are increasingly exploiting the popularity of AI development tools to distribute malware through sophisticated social engineering campaigns. Security researchers recently uncovered a new attack technique, InstallFix, that leverages fake installation guides for popular command-line too

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.