New malware removal guides

Secured Message From The Canada Revenue Agency Email Scam
Phishing/Scam

Secured Message From The Canada Revenue Agency Email Scam

We have analyzed the email and found that it is disguised as a "secured message" from the Canada Revenue Agency. In reality, it is a phishing email written by fraudsters who aim to steal personal information via a fake website. Falling for this scam can result in account compromise and further pro

Suspicious Access To Your Mailbox Scam
Phishing/Scam

Suspicious Access To Your Mailbox Scam

We have examined the message and found that it is written by scammers who seek to trick recipients into sharing personal information. The email is disguised as a notification from the email provider to appear legitimate. It contains a link to a deceptive website. Such scams are classified as phish

MIMICRAT Malware
Trojan

MIMICRAT Malware

MIMICRAT is a remote administration Trojan (RAT) written in C++. Cybercriminals were observed distributing the RAT using a deceptive technique known as ClickFix. Once a device is infected with MIMICRAT, the attackers can perform various malicious actions remotely. If this threat is detected, it sh

Lockdown Ransomware
Ransomware

Lockdown Ransomware

Lockdown is ransomware designed to block access to files by encrypting them. In addition to encrypting data, it appends its extension (".crypt_lock") to files. For example, it renames "1.jpg" to "1.jpg.crypt_lock", "2.png" to "2.png.crypt_lock", and so forth. Lockdown also displays a full-screen r

Top malware removal guides

.Xyz Ransomware
Ransomware

.Xyz Ransomware

.Xyz is a new variant of Jigsaw ransomware. Following infiltration, this ransomware encrypts various files stored on victims' computers. This is achieved using asymmetric cryptography. During encryption, this ransomware appends the name of each encrypted file with a ".xyz" extension and, thus, it

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Find-it.pro Redirect
Browser Hijacker

Find-it.pro Redirect

Find-it.pro is a fake search engine discovered by our researchers during a routine investigation. In most cases, sites of this kind cannot provide search results and redirect to legitimate search engines. These pages are promoted through rogue redirects produced by browser hijackers. Brows

Cyber Security News

Hugging Face Pushed Infostealer Via Fake OpenAI Repository
Date

Hugging Face Pushed Infostealer Via Fake OpenAI Repository

The rapid rise of open-source repositories of artificial intelligence has transformed platforms like Hugging Face into critical infrastructure for developers, researchers, and enterprises. Millions of users rely on these repositories to download models, datasets, and applications that accelerate AI

Chaos Ransomware Used As Diversion By MuddyWaters
Date

Chaos Ransomware Used As Diversion By MuddyWaters

The lines between cybercrime and state-sponsored espionage continue to blur. Iranian threat actors now adopt ransomware tradecraft to conceal intelligence-gathering operations. Recent investigations into attacks by the Iranian-linked MuddyWater group show a sophisticated evolution in tactics. Here,

North Korean Hackers Claim 76% Of Crypto Theft In 2026
Date

North Korean Hackers Claim 76% Of Crypto Theft In 2026

The global cybercrime landscape in 2026 shows a sharp convergence of state-sponsored hacking, transnational fraud networks, and highly industrialized scam operations. Cryptocurrency remains at the center, offering both high-value targets and efficient laundering methods. Recent reports from TRM Labs

Bluekit Phishing Service Includes AI Assistant
Date

Bluekit Phishing Service Includes AI Assistant

The emergence of Bluekit, as recorded by security researchers at Varonis, marks a significant evolution in the phishing-as-a-service (PhaaS) ecosystem. It shows how cybercrime continues to industrialize through automation, centralization, and the integration of artificial intelligence. Recent resea

Snow Malware Turns Microsoft Teams Into An Intrusion Platform
Date

Snow Malware Turns Microsoft Teams Into An Intrusion Platform

Cybercriminals keep showing that the easiest way into an enterprise is often through trust, not software vulnerabilities. Google's Mandiant Team discovered a new threat actor, UNC6692, that proves this point. This group weaponizes Microsoft Teams, abuses helpdesk impersonation, and deploys a custom

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.