New malware removal guides

Massiv Banking Trojan (Android)
Trojan

Massiv Banking Trojan (Android)

Massiv is a banking Trojan aimed at Android devices. It allows threat actors to take control of infected phones and carry out fraudulent transactions from the victim's bank accounts. Cybercriminals disguise Massiv as IPTV apps to trick users searching for online TV services. If detected on a devic

Cynovira.com Ads
Notification Spam

Cynovira.com Ads

We analyzed cynovira[.]com and found that it uses clickbait to lure visitors into enabling notifications. These notifications may show misleading content and direct users to untrustworthy websites. Users should be cautious with sites like cynovira[.]com and avoid following the instructions they pr

PromptSpy Malware (Android)
Trojan

PromptSpy Malware (Android)

PromptSpy is an Android malware that uses generative AI for persistence. It uses Google Gemini to analyze what appears on the infected device's screen and determine how to remain active in the recent apps list. This helps the malware keep running in the background. Its main goal is to install a VN

BoryptGrab Stealer
Trojan

BoryptGrab Stealer

BoryptGrab is malware that steals information from infected devices in various ways. It spreads through fake GitHub pages offering free software. It is important to note that during the attack chain involving BoryptGrab, another malware, a backdoor known as TunnesshClient can be injected. If detec

VKontakte (VK)-themed Account Hijackers
Potentially unwanted application

VKontakte (VK)-themed Account Hijackers

VKontakte (VK)-themed account hijackers are malicious extensions that masquerade as VKontakte customization tools but actually take over VK accounts. There are at least five fake extensions (mentioned in our article below) that contain malware and are designed to perform specific tasks. If any of

Top malware removal guides

Search1.me Redirect
Browser Hijacker

Search1.me Redirect

Search1.me is the address of a fake search engine. Typically, such web searchers are promoted by PUAs (Potentially Unwanted Applications) classified as browser hijackers. Search1.me has been observed being pushed by the Better Search browser hijacker. Browser hijackers promote fraudulent w

Rainbow Lottery Email Scam
Phishing/Scam

Rainbow Lottery Email Scam

After reading this "Rainbow Lottery" email, we determined that it is spam. It claims that the recipient's email address has been randomly selected as a winner of one million GBP (pound sterling). The purpose of this spam campaign is to trick victims into disclosing sensitive data and potentially

LinkedIn Email Scam
Phishing/Scam

LinkedIn Email Scam

"LinkedIn email scam" refers to spam campaigns - large-scale operations during which thousands of emails presented as messages from LinkedIn are sent. LinkedIn is a business and employment-oriented online service, designed to aid in professional networking. The aim of the fake "LinkedIn" emails i

Pulse Browser Unwanted Application
Potentially unwanted application

Pulse Browser Unwanted Application

Pulse is a Chromium-based browser. It is promoted as an Internet browser that integrates AI (Artificial Intelligence). Upon inspection, we determined that this rogue browser is a PUA (Potentially Unwanted Application). It produces redirects to several fake search engines that cannot generate searc

Cyber Security News

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA
Date

Global Cybercrime Disruptions Target LeakBase And Tycoon2FA

A coordinated international law enforcement effort has delivered a significant blow to the cybercrime ecosystem. Authorities from the United States, Europe, and multiple partner nations recently dismantled the major hacker forum LeakBase. They also disrupted Tycoon2FA, one of the world's largest phi

North Korea\'s APT37 Seen Breaching Air-Gapped Networks
Date

North Korea's APT37 Seen Breaching Air-Gapped Networks

APT37 is again making headlines, where previously the North Korean-linked state-sponsored group was linked with deploying data wipers; now they're breaching air-gapped networks. Also tracked under aliases such as ScarCruft, Reaper, Red Eyes, and Ricochet Chollima, this actor has long been associated

Fake Next.js Interview Turns Into Machine Compromise
Date

Fake Next.js Interview Turns Into Machine Compromise

In February 2026, researchers revealed a coordinated campaign that targeted software developers through fake job interview projects, demonstrating how threat actors increasingly weaponize trust within development workflows. This is yet another example of threat actors targeting developers specifical

ATM Malware Attacks Result In Loss Of $20 Million In 2025
Date

ATM Malware Attacks Result In Loss Of $20 Million In 2025

In 2025 and early 2026, law enforcement and cybersecurity agencies in the United States have sounded repeated alarms over the rise of sophisticated ATM "jackpotting" attacks, incidents in which threat actors use malware and physical access to force automated teller machines to dispense cash illegall

Latest Software Reviews

Combo Cleaner Review

Date

Antivirus

Combo Cleaner Review

Combo Cleaner is an all-in-one solution developed by RCS LT, the company behind PCrisk.com. Making a powerful entrance as a comprehensive antivirus and system optimization solution, it's here to shield you from various threats on Windows, macOS, Android, and iOS.