Medusa Stealer Combines Cryptominer and Spyware
Medusa Stealer is a strain of malware that combines a wide range of malicious features inside it. The malware functions as both data stealer and cryptominer, as well as a DDoS tool. Its data exfiltration capabilities... Read more
CMLOCKER Ransomware Asks for $1k in Ransom
CMLOCKER is yet another newly discovered ransomware variant. This strain does not belong to any large ransomware family. CMLOCKER does nothing out of the ordinary when it comes to ransomware. The malware will encrypt... Read more
Vital-scanner.com Pushes Ads Through Fake Warnings
Vital-scanner dot com is a misleading website that will try to scare visitors into accepting ads in their browser, using false messages and fake warnings. Sites like Vital-scanner dot com belong to what can be called... Read more
What is the SearchHost.exe File and Process?
Some users have posted about their concerns when it comes to a specific file named SearchHost.exe. What exactly is SearchHost.exe and it is a dangerous file? First things first - we should make it very clear that... Read more
How To Remove and What is Tuow Ransomware?
The latest ransomware variant spotted in the wild is another variation of the Djvu ransomware code. The new variant is called simply the Tuow ransomware. Tuow will encrypt files on the targeted system, making them... Read more
Defender-pro-2022.xyz Pushes Ads Through Fake Virus Alerts
Defender-pro-2022 dot xyz is a misleading website that will display fake virus warnings and attempt to scare the visitor into accepting ads delivered through push notifications. The page is designed to look like it's... Read more
RONALDIHNO ENCRYPTER Ransomware Makes Exaggerated Threats
RONALDIHNO ENCRYPTER is the strange name of a new strain of file-encrypting malware. The program behaves largely as a ransomware variant. RONALDIHNO ENCRYPTER will, fittingly, encrypt almost all files on a system. The... Read more
How to Stop Power-stability.com Ads
Power-stability dot com is a misleading website. Its only purpose is to frighten visitors and push ads in their browsers. Similar misleading pages will use images tailor-made to look like legitimate antivirus software... Read more
Entertainment.exe - Cryptominer in Disguise
Entertainment.exe is one of the possible names under which a malicious cryptominer is distributed. Cryptominers are a type of malware that harvests the infected system's resources, most notably the CPU and GPU... Read more
Tury Ransomware Joins Djvu Clone Army
Tury ransomware is yet another clone that belongs to the Djvu ransomware family. At present, Djvu clones likely represent the largest group of variants based on the same ransomware. Tury will encrypt your system and... Read more
How to Avoid Device-variety.xyz Ads
Device-variety dot xyz is a misleading website that will attempt to trick users into allowing annoying and potentially harmful ads inside their browsers. This particular website belongs to the category that can be... Read more
Beware of the 'MicroStrategy Crypto Giveaway' Scam
Yet another fake cryptocurrency giveaway was recently put up online to scam those gullible enough to still believe this sort of overdone setup. The scam abuses the name and likeness of American entrepreneur Michael... Read more