News

New Hacking Group Seen Laying Foundation for Supply Chain Attack

A new hacking group has emerged from the shadows, dubbed Tortoiseshell by researchers, the group has been seen targeting IT companies. The reason behind it, it appears the group is laying the foundation for a supply chain attack. Such attacks can be a nightmare for organizations as they often target less secure elements of the organization, whether it be a third-party supplier or an in house system not properly secured which could grant access to the entire network. According to a report published by Symantec the new group uses a combination of custom tools and off the shelf malware to conduct its operations. The group has been active since the middle of 2018 and in that time has targeted at least 11 IT providers. Most of the targeted IT providers reside in Saudi Arabia. According to the researchers, it appears that the hacker group aimed to gain domain level access, this would grant the group access to an organi...

Emotet Raised from the Dead

Widely regarded as one of the most dangerous bo...

Business Email Compromise Scams Raked in $26 Billion

In a recent public service announcement release...

New Cyber Espionage Malware Emerges

Researchers have discovered a new piece of malw...

Top Removal Guides

Bing.com Redirect

Bing.com is a legitimate Internet search engine. This site is developed by a legitimate company and is not related to any virus or malware. Be ...

Search.yahoo.com Redirect

Search.yahoo.com is a popular website that can be used as the browser homepage or default Internet search engine. Recently, there is a rise in ...

Support Forum

This forum was created to individually help our readers with spyware and virus removal. Feel free to post your questions and our staff will do their best to answer them and provide the latest relevant information.

New Removal Guides

Jeanson J. Acheta Sextortion Email Scam

Scammers send this email scam to a number of people hoping that someone will fall for it and pay them money. There are many scams of this type, typically, scammers claim that they recorded some humiliating/compromising video and threaten to spread it if their demands to pay a particular amount of money will not be met on time. There are more variants of this scam, however, the main differences are the amount of money that scammers demand to be paid and Bitcoin wallet address that supposed to be used to make a payment. Either way, we strongly recommend not to trust this or any other scam (email) of this type. According to the scammer behind this spam campaign, he injected some malicious code into recipient's computer and used it to monitor computing activity. What's interesting is that sender claims to be Jeason James Acheta, who is a notorious cyber criminal known for being the first person to be charged...

CinematicFanatic Toolbar

CinematicFanatic is a rogue application, de...

Online News Now Browser Hijacker

Online News Now is a browser hijacker, adve...

Top Antispyware

SpyHunter 5

Overview: Simply put a rootkit is a program or, more often, a collection of software tools that gives the hacker remote access to and control ov...

Malwarebytes Anti-Malware

Malwarebytes Anti-malware Pro costs $24.95 for a lifetime license and includes additional features not available in the free version, such as rea...

Top Antivirus

Combo Cleaner: Antivirus and System Optimizer (for Mac computers)

  Supported platforms: At time of testing, Combo Cleaner was only available for Mac computers running the Mac OSX 10.10 (Yosemite), Mac ...

Avast Internet Security

Cost Many antivirus producers are wondering what it takes to make a successful paid for suite. What needs to be included to justify the price ta...

Malware activity

Global virus and spyware activity level today:

Medium threat activity
Medium

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal

Stay in touch with PCrisk