New malware removal guides

VoidStealer Malware
Trojan

VoidStealer Malware

VoidStealer is a type of malware that steals sensitive data from browsers. It uses a technique, a debugger-based method to bypass browser protection (Application-Bound Encryption) by monitoring memory while the browser is running. This allows it to capture encryption keys without needing special p

Saudevic.com Ads
Notification Spam

Saudevic.com Ads

Our team has inspected saudevic[.]com and found that it uses clickbait to get permission to show notifications. If this permission is given, saudevic[.]com delivers fake alerts and similar messages. Interacting with those notifications can direct users to unreliable websites. Overall, saudevic[.]c

Pending Configuration Verification Email Scam
Phishing/Scam

Pending Configuration Verification Email Scam

Our inspection of the email indicates it was written by scammers seeking to steal personal information. Scams of this type are classified as phishing attempts. This message includes a link to a fake website designed to trick visitors into entering personal details. It should be ignored to avoid po

Vendor Agreement Email Scam
Phishing/Scam

Vendor Agreement Email Scam

Our team has determined that it is a phishing email disguised as a message regarding a vendor agreement. It is designed to trick recipients into opening a fake website that instructs visitors to enter personal information. Victims of this scam may experience account hijacking and other negative co

Top malware removal guides

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Funds Has Been Credited To Your Account Email Scam
Phishing/Scam

Funds Has Been Credited To Your Account Email Scam

After examining the "Funds Has Been Credited To Your Account" email, we determined that it is spam. The letter states that it contains an attached file concerning a revised payment. However, the attachment is a phishing file that targets email account log-in credentials. The spam email wit

Search.live-history.com Redirect
Browser Hijacker

Search.live-history.com Redirect

Search.live-history.com is a fake search engine, which we discovered while analyzing the LivingHistory browser hijacker. This software is endorsed as a quick-access tool for the user's browsing history. Browser hijackers modify browsers to produce redirects to their promoted websites, such as sear

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Cyber Security News

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Fake Claude Code Installation Guides Deliver Amatera
Date

Fake Claude Code Installation Guides Deliver Amatera

Cybercriminals are increasingly exploiting the popularity of AI development tools to distribute malware through sophisticated social engineering campaigns. Security researchers recently uncovered a new attack technique, InstallFix, that leverages fake installation guides for popular command-line too

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.