What is Woreflint Trojan?
Woreflint is the detection name assigned to a malicious program that functions as a trojan horse. Detection names are not always the same thing as the actual payload and the Woreflint detection can signify a number of... Read more
Proud Browser Exhibits Adware Behavior
Proud Browser is the name of an application that is distributed in the form of a browser extension and functions as adware. Adware is software that will often install on your system without your knowledge or consent... Read more
How to Avoid Allactualspot.com Ads
Allactualspot dot com is a misleading website that attempts to push ads in users' browsers. Landing on the page in the first place means you very likely hit a bad redirect or clicked on a rogue ad on a different site.... Read more
InputView Adware on Mac Can Be Seriously Annoying
InputView is the meaningless name of an ad-supported application for Mac. InputView belongs to the big family of AdLoad adware clones and variants. You may find its icon in your Applications folder - a bland circle... Read more
lUUUUUUUUU Ransomware Uses Weird Extension
There is a new ransomware strain in the wild, called by researchers the lUUUUUUUUU ransomware. The unusual name comes from the file extension that the ransomware appends to encrypted files. lUUUUUUUUU belongs to the... Read more
How to Avoid Higedgene.com Ad Pop-Ups
Higedgene dot com is a misleading website that will attempt to trick users into accepting push notifications from it. Similar misleading pages use push notification functionality to push ads in your browser. In the... Read more
Uyro Ransomware Joins Host of Djvu Clones That Encrypt PC Files
Uyro ransomware is the name of a new Djvu ransomware clone. The new variant was discovered in late 2022. Uyro behaves like all other Djvu clones. It encrypts the victim system, leaving files scrambled. Once encrypted,... Read more
Whiteboard New Tab Rogue Browser Extension May Modify Internet Settings
Whiteboard New Tab is a rogue browser extension that shares similarities with browser hijackers. Browser hijackers are a subcategory of potentially unwanted software. This sort of app will make changes to your browser... Read more
PC App Store Rogue Optimization App
PC App Store is the name of a potentially unwanted application that functions as adware, in addition to its advertised functionality. PC App Store can be broadly categorized as a rogue optimization app. It claims that... Read more
HBM Ransomware is a New Dharma Clone Targeting Files to Encrypt
Researchers discovered a new ransomware variant that belongs to the Dharma family of clones. The new version is called the HBM ransomware. HBM encrypts documents, media files, archives and databases on the victim... Read more
Microsoft Request Verification Scam Dangles Fake Document
A new scam is being circulated online, attempting to phish out victim credentials. The new scam is very simple in its design. Victims receive an email that claims it contains a link to a Microsoft Word document hosted... Read more
RAXNET Stealer Attempts to Empty Crypto Wallets
RAXNET Stealer is the name of a malicious application that is classified as a clipper. Clippers are widely used to steal cryptocurrency, due to the way they operate. A clipper like RAXNET Stealer can monitor the... Read more