Threats
PingPull Malware
Security researchers with Palo Alto's Unit 42 discovered and analyzed a new strain of malware called PingPull. The new malware has RAT capabilities and is particularly difficult to detect. PingPull is the newest tool... Read more
Rundll32.exe
The file name Rundll32.exe has cropped up numerous times in relation to security concerns and threats. Before we go any further, however, we should make one thing very clear. Rundll32.exe is a legitimate Windows file.... Read more
Findquide Browser Hijacker
Findquide is the name of a browser hijacker and a piece of potentially unwanted software. Potentially unwanted programs inhabit a grey area, existing somewhere in-between legitimate applications and full-blown... Read more
Bbii Ransomware
The Bbii ransomware is the latest clone of the ever-present Djvu ransomware. With over a dozen Djvu variants cropping up every week for months now, Djvu is probably the most numerous ransomware family when it comes to... Read more
Altruistics Trojan
Altruistics is the unusual name of a piece of malware that exhibits the features and functionality of a Trojan horse. Altruistics is distributed through several methods, including malicious spam emails containing a... Read more
How to Avoid Shoksips.com Ad Pop-Ups
Shoksips dot com is a misleading website with a randomly generated domain name, set up with one simple goal - to push annoying ads in the browsers of as many visitors as possible and generate revenue for the website... Read more
SysWin.exe Malware
SysWin.exe is the name of a file that is detected as several different types of malware by different anti-malware suites. While there is no consensus on what type of malware exactly SysWin.exe is, being detected as... Read more
McAfee Popup Scam
The so-called "McAfee popup" scam is a simple but effective scam that can show up online and attempts to phish user credentials. The scam is very simple in its design. The user lands on an untrustworthy page, usually... Read more
Ritzer Ransomware
The Ritzer ransomware is a new arrival in the lineup of Chaos ransomware clones. The new strain called Ritzer behaves largely as you would expect - it encrypts most files on the victim system, leaving files essential... Read more
Pandora (TeslaRVNG) Ransomware
Pandora is the name of a new strain of ransomware. The new variant should not be confused with the Pandora ransomware that made headlines in early 2022, which was a new iteration of the Rook ransomware codebase. The... Read more
Chromesearch.club Hijacks Browser Settings
Chromesearch dot club is a fake search engine that can also be associated with a browser hijacker. Browser hijackers are classified as potentially unwanted programs - a grey category of software that fills the space... Read more
FakeCrack Malware Spread Using Crack Sites
Cracked software is used as a lure to spread cryptostealers in a new malicious campaign dubbed FakeCrack. The malicious payloads used in the campaign comprise infostealer malware strains that are capable of stealing... Read more
'Properties' Chrome Browser Hijacker
Browser hijackers are arguably the most common type of badware that affects Mac computers. "Properties" is the name of one such browser hijacker that can affect Macs and instances of Chrome installed on them. Having... Read more
Ursearch.net Browser Hijacker
Ursearch dot net is the name of a browser hijacker that will change a number of settings on your system and in your browser, ultimately damaging your browsing experience. Browser hijackers can change the browser's... Read more
Dark Web Hacker Ransomware
The Dark Web Hacker ransomware is a new strain of file-encrypting malware. The new malware is based on the Chaos ransomware codebase and belongs to the broader Chaos variants family. The ransomware encrypts files,... Read more
Active Search Bar Browser Hijacker
Active Search Bar is the name of a rather generic browser hijacker and potentially unwanted program. Potentially unwanted programs or PUPs aren't on the same threat level as malware, but as their name suggests their... Read more
'Your OneDrive Is Inactive And Will Soon Be Deleted' Scam Tries to Phish Out Credentials
There is yet another scam making the rounds currently. The latest attempt to scam people is called the "Your OneDrive Is Inactive And Will Soon Be Deleted" scam. The gist of the scam is very simple - victims receive a... Read more
Bbzz Ransomware
The Bbzz ransomware is the latest arrival in a seemingly endless queue of Djvu ransomware clones that keep cropping up overnight. The ransomware acts as you would expect - it encrypts most files on the victim system,... Read more