Should You Pay the Nnuz Ransomware Ransom to Get Your Files Back?
Nnuz Ransomware is one of the many threats that has joined the STOP/Djvu family of threats, which are known to be rather aggressive in their approach to extort money from computer users by encrypting files on their... Read more
ArguePatch Malware Used in Cyber Attacks on Ukraine
Security researchers have spotted more activity from the Sandworm advanced persistent threat actor. Sandworm is now using an updated version of the ArguePatch malware loader to attack more targets located in Ukraine.... Read more
How To Stop IntegerLocator Adware Pop-Ups
IntegerLocator is a potentially unwanted application. It can affect computers running macOS. IntegerLocator has a number of similarities it shares with browser hijackers and adware. It can silently inject ads into the... Read more
TeamBot Dropper Delivers Additional Malware
TeamBot is the name of a malware dropper that is used to deliver a number of additional threats. The way malware droppers operate is usually connecting to the command and control server controller by the hackers and... Read more
Predator Mobile Malware Targets Android Phones
Security researchers with Google's Threat Analysis Group (TAG) have recently published detailed information on a piece of mobile malware affecting Android devices. The mobile malware is named PEDATOR and was used in... Read more
Should You Trust Pop-Ups From News-gafivi.cc?
News-gafivi.cc is a website that is known for displaying pop-up alerts that may attempt to get permission to display additional notifications. Such notifications should never be trusted under any circumstances.... Read more
What is Industrial Spy Market Ransomware?
Industrial Spy Mark Ransomware is the name given to a new strain of file-encrypting malware. There is no hard evidence that the new strain belongs to any of the big ransomware families. Unlike the majority of popular... Read more
"CAETANO FORMULA" Email Scam Uses Unimpressive Bait
A new scam is being distributed using malicious spam emails. The name given to it is the "CAETANO FORMULA" scam. The malicious emails are used to spread the Agent Tesla remote access trojan. The malicious file is... Read more
Elbie Ransomware
Cybercriminals are busy infiltrating vulnerable computers with malware threats that earn them money. Ransomware has been one of their primary weapons for extorting money from victimized computer users, and the Elbie... Read more
How to Remove Horsemagyar Ransomware
Horsemagyar is the unusual name of a newly discovered strain of file-encrypting malware. There is no indication that the ransomware belongs to any of the major groups or families of ransomware. Horsemagyar would... Read more
Watchvideo.pro Uses Free iPhone Scam to Push Ads
Watchvideo dot pro is a website that mixes deceptive components of scams and misleading websites. The entire purpose of the site is to coax users into allowing push notifications on their browsers so that the page can... Read more
Silenthill24.biz Spams Browsers with Ads
Silenthill24 dot biz is a misleading website, intended to lure users into allowing notifications. When a person browsing online lands on Silenthill24 dot biz, usually by following a rogue ad on a page, they see an... Read more