Threats

Qotr Ransomware is Another Djvu Variant That Demands Money To Restore Encrypted Files screenshot

Qotr Ransomware is Another Djvu Variant That Demands Money To Restore Encrypted Files

Qotr ransomware is a type of Djvu ransomware that adds the ".qotr" extension to files after encrypting them. It generates a "_readme.txt" file with contact and payment information once it has encrypted data. Qotr... Read more

February 27, 2023
Beware of the Quick Video Find Rogue Extension screenshot

Beware of the Quick Video Find Rogue Extension

Our research team identified the Quick Video Find browser extension while conducting an examination of untrustworthy websites. This extension promises users easy access to free downloads of audio/video from browsed... Read more

February 27, 2023
What is the Roghe Ransomware? screenshot

What is the Roghe Ransomware?

Roghe is the name of a type of malicious software known as ransomware. Ransomware is designed to encrypt data, making it inaccessible to users, and then demand payment in exchange for the decryption key. When we... Read more

February 24, 2023
Use Caution With The

Use Caution With The "Account Will Be Terminated" Email Scam

Upon conducting an analysis of the email titled "Account Will Be Terminated", we have discovered that it is a spam message. The fraudulent email claims that the recipient's email account will be shut down unless they... Read more

February 24, 2023
What Does The TNT AWB Email Scam Do? screenshot

What Does The TNT AWB Email Scam Do?

Upon examination, it has been revealed that this is a malicious attempt to obtain personal information from the recipient. The email was sent from Elaine Poon, who is believed to be a Customer Service Executive from... Read more

February 24, 2023
Alice Ransomware Uses Ransom Note in Russian screenshot

Alice Ransomware Uses Ransom Note in Russian

During our investigation into new malware submissions to online threat databases, our team discovered the Alice ransomware. This particular type of malware encrypts a victim's data and demands a ransom for decryption.... Read more

February 23, 2023
Beware of AssistiveBalance Adware screenshot

Beware of AssistiveBalance Adware

The AssistiveBalance application was found to be displaying aggressive and unwanted advertisements, which classifies it as adware. This type of software is created for the purpose of generating revenue by showing ads.... Read more

February 27, 2023
The Hockey Start Browser Hijacker Creates A Security Risk screenshot

The Hockey Start Browser Hijacker Creates A Security Risk

When researchers dug into suspicious websites, they found one that promoted the Hockey Start browser extension. It was advertised as a way to quickly access hockey sports-related online content. However, the analysis... Read more

February 27, 2023
S1deload Stealer Goes After Facebook Accounts screenshot

S1deload Stealer Goes After Facebook Accounts

S1deload is a type of malware that steals information and is specifically designed to target Facebook and YouTube accounts. It also has the ability to mine cryptocurrency using infected computers. The reason behind... Read more

February 24, 2023
Why You Should Beware of the

Why You Should Beware of the "Aura Antivirus Protection" Pop-Up Scam

Upon investigation, it has been revealed that this is a scam run by misleading websites, which displays fraudulent messages, including false warning messages, which claim that a computer is infected with viruses and... Read more

February 24, 2023
What is the Search.anytime-anywhere-tab.com Browser Hijacker? screenshot

What is the Search.anytime-anywhere-tab.com Browser Hijacker?

Testing search.anytime-anywhere-tab.com revealed that it is a fraudulent search engine, commonly found when promoted through browser hijackers. These applications alter web browser settings and redirect users to... Read more

February 24, 2023
SHTORM Ransomware Joins Phobos Family of Clones To Attack Files screenshot

SHTORM Ransomware Joins Phobos Family of Clones To Attack Files

The SHTORM ransomware belongs to the Phobos ransomware family, as discovered by our malware researchers while examining malware samples submitted to the VirusTotal page. The malware encrypts data, alters filenames,... Read more

February 23, 2023
RadianceChecked Adware Can Be Massively Annoying screenshot

RadianceChecked Adware Can Be Massively Annoying

Our research team recently conducted an investigation on new submissions to online threat databases and uncovered the RadianceChecked app, which is classified as adware belonging to the AdLoad malware family. Adware... Read more

February 27, 2023
Beware of the Finder-search.com Browser Hijacker screenshot

Beware of the Finder-search.com Browser Hijacker

Finder-search.com is a malicious search engine that shows deceptive and unrelated content in its search results, which can be dangerous to users. Browser hijackers are often responsible for redirecting users to this... Read more

February 27, 2023
What is the

What is the "Suspicious Login Attempt On Your Windows Computer" Email Scam?

Upon investigation of the email claiming a "Suspicious Login Attempt On Your Windows Computer," we have concluded that it is a technical support scam disguised as spam. The email pretends to be an alert from... Read more

February 24, 2023
How to Avoid Likerus.click Ads screenshot

How to Avoid Likerus.click Ads

Likerus.click is an unreliable website that displays false information and attempts to send notifications. Our team found it while researching sites that use malicious advertising networks. It's likely users didn't... Read more

February 24, 2023
Stealc Malware is a Customizable Infostealer screenshot

Stealc Malware is a Customizable Infostealer

A new popular information stealing tool called Stealc has been identified on Russian-speaking dark web forums. According to a report from Sekoia.io, Stealc is a fully functional tool that competes with other popular... Read more

February 23, 2023
What Does AdvancedBrowser Adware Do To Your Computer? screenshot

What Does AdvancedBrowser Adware Do To Your Computer?

During the evaluation of new software submissions to online threat databases, our researchers ran into the AdvancedBrowser application. After a thorough analysis of this software, it was determined that it belongs to... Read more

February 23, 2023
Loading...