New malware removal guides

Fake Google Docs Offline Extension
Adware

Fake Google Docs Offline Extension

The fake Google Docs Offline extension is a malicious Chrome extension that masquerades as a real Google tool. It is injected as part of a larger attack and is used to spy on users. Once planted, it can log what victims type, steal cookies, login sessions, and capture screenshots. If present on a

Cloud Storage Renewal Failed Email Scam
Phishing/Scam

Cloud Storage Renewal Failed Email Scam

We have reviewed the email and found that it is a scam disguised as a final notice from a cloud service. The scammers behind it seek to trick recipients into opening a misleading website and following the provided instructions. None of the claims in this email (or the associated scam sites) is tru

Vect Ransomware
Ransomware

Vect Ransomware

Vect is ransomware that we have discovered while inspecting malware samples uploaded to VirusTotal. Once a system is infected, this ransomware encrypts and renames files, changes the desktop wallpaper, and drops a ransom note ("!!!_READ_ME_!!!.txt"). An example of how it renames files: it changes

Huverify.co.in Ads
Notification Spam

Huverify.co.in Ads

Our assessment indicates that huverify.co[.]in is set up to manipulate visitors into enabling notifications. Once permission is given, it can push deceptive alerts, fraudulent promotions, and other questionable content intended to drive traffic to unreliable websites. Users are advised not to trus

Cholablelogne.com Ads
Notification Spam

Cholablelogne.com Ads

Our analysis shows that cholablelogne[.]com is designed to trick users into accepting its notifications. If permission is granted, it may send misleading alerts, fake offers, and other unreliable contend used to promote shady websites. Users should avoid visiting cholablelogne[.]com and never allo

Top malware removal guides

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

WebWebWeb.com Redirect
Browser Hijacker

WebWebWeb.com Redirect

The WebWebWeb.com browser hijacker infiltrates Internet browsers (Google Chrome and Mozilla Firefox) through free software downloads. At time of testing, this website was promoted via an application called 'video downloader professional'. Developers of this browser settings-changing adware (LINK6

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Ad Block Wonder Adware
Adware

Ad Block Wonder Adware

This browser extension is promoted as a tool for blocking pop-ups and ads on favourite websites. However, we have inspected Ad Block Wonder and found that it has the qualities of adware. Once added, it can show unwanted and annoying advertisements. Thus, it is advisable not to add this extension t

Cyber Security News

LiteLLM PyPI Package Backdoored
Date

LiteLLM PyPI Package Backdoored

A supply chain attack campaign attributed to the TeamPCP threat group marks one of the most consequential and fast-moving compromises of modern software development infrastructure. The attackers targeted trusted developer tools and open-source ecosystems. This campaign showed how a single foot

VoidStealer Seen Bypassing Chrome\'s App-Bound Encryption
Date

VoidStealer Seen Bypassing Chrome's App-Bound Encryption

The emergence of VoidStealer marks a significant evolution in the infostealer malware landscape. It demonstrates how quickly threat actors adapt to defensive innovations. By using a novel debugger-based technique to bypass Google Chrome's Application-Bound Encryption (ABE), VoidStealer highlights th

New iOS Exploit Kit DarkSword Targets iPhones
Date

New iOS Exploit Kit DarkSword Targets iPhones

A newly uncovered iOS exploitation framework called DarkSword is reshaping the mobile threat landscape. It signals a shift from targeted espionage tools to scalable, multipurpose attack infrastructure. Joint research from Google Threat Intelligence Group (GTIG) and Lookout shows how advanced exploit

SEO Poisoning Attack Driving Credential Theft
Date

SEO Poisoning Attack Driving Credential Theft

A financially motivated threat actor is leveraging deceptive websites and weaponized software installers to steal corporate VPN credentials, underscoring the rising sophistication of social-engineering-based cyber intrusions. Security researchers recently uncovered a campaign in which attackers dis

New BeatBanker Malware Masquerading As Starlink
Date

New BeatBanker Malware Masquerading As Starlink

Cybercriminals continue to refine mobile malware campaigns by blending social engineering, financial fraud, and covert resource exploitation into a single attack chain. A newly identified Android malware strain, BeatBanker, demonstrates this evolution by combining banking Trojan capabilities, crypto

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.