Threats

ERMAC 2.0 Android Trojan screenshot

ERMAC 2.0 Android Trojan

ERMAC 2.0 is the name of a piece of mobile malware affecting Android devices. ERMAC 2.0 is an Android banking trojan and seems to be primarily targeting European users. The malware is being sold on the dark web, at a... Read more

May 25, 2022
Surprise! Mac Computers are Susceptible to Malware Threats like 'Vastvista' screenshot

Surprise! Mac Computers are Susceptible to Malware Threats like 'Vastvista'

Vastvista is a malware threat that affects Mac computers. Contrary to what you have thought about Mac computers not being suspectable to malware attacks, threats like Vastvista are known to attack MacOS systems where... Read more

May 24, 2022
Should You Pay the Nnuz Ransomware Ransom to Get Your Files Back? screenshot

Should You Pay the Nnuz Ransomware Ransom to Get Your Files Back?

Nnuz Ransomware is one of the many threats that has joined the STOP/Djvu family of threats, which are known to be rather aggressive in their approach to extort money from computer users by encrypting files on their... Read more

May 24, 2022
ArguePatch Malware Used in Cyber Attacks on Ukraine screenshot

ArguePatch Malware Used in Cyber Attacks on Ukraine

Security researchers have spotted more activity from the Sandworm advanced persistent threat actor. Sandworm is now using an updated version of the ArguePatch malware loader to attack more targets located in Ukraine.... Read more

May 23, 2022
How To Stop IntegerLocator Adware Pop-Ups screenshot

How To Stop IntegerLocator Adware Pop-Ups

IntegerLocator is a potentially unwanted application. It can affect computers running macOS. IntegerLocator has a number of similarities it shares with browser hijackers and adware. It can silently inject ads into the... Read more

May 23, 2022

"CAETANO FORMULA" Email Scam Uses Unimpressive Bait

A new scam is being distributed using malicious spam emails. The name given to it is the "CAETANO FORMULA" scam. The malicious emails are used to spread the Agent Tesla remote access trojan. The malicious file is... Read more

May 23, 2022
Webheroes.store Attempts to Push Ads Using Fake Video screenshot

Webheroes.store Attempts to Push Ads Using Fake Video

Webheroes dot store is a misleading website, set up with the explicit purpose of pushing intrusive ads to visitors' browsers. The page at webheroes dot store will display a fake image of a video player and a... Read more

May 25, 2022
Beware! Shieldproblocker.xyz Pop-Ups Attempt to Get Permission to Display Potentially Malicious Notifications screenshot

Beware! Shieldproblocker.xyz Pop-Ups Attempt to Get Permission to Display Potentially Malicious Notifications

Shieldproblocker.xyz is a misleading website that is deemed a browser hijacker due to it having components associated with the site that may modify Internet settings and cause unwanted actions. Landing on the... Read more

May 24, 2022
Should You Trust Pop-Ups From News-gafivi.cc? screenshot

Should You Trust Pop-Ups From News-gafivi.cc?

News-gafivi.cc is a website that is known for displaying pop-up alerts that may attempt to get permission to display additional notifications. Such notifications should never be trusted under any circumstances.... Read more

May 24, 2022

What is Industrial Spy Market Ransomware?

Industrial Spy Mark Ransomware is the name given to a new strain of file-encrypting malware. There is no hard evidence that the new strain belongs to any of the big ransomware families. Unlike the majority of popular... Read more

May 23, 2022
Watchvideo.pro Uses Free iPhone Scam to Push Ads screenshot

Watchvideo.pro Uses Free iPhone Scam to Push Ads

Watchvideo dot pro is a website that mixes deceptive components of scams and misleading websites. The entire purpose of the site is to coax users into allowing push notifications on their browsers so that the page can... Read more

May 23, 2022
Silenthill24.biz Spams Browsers with Ads screenshot

Silenthill24.biz Spams Browsers with Ads

Silenthill24 dot biz is a misleading website, intended to lure users into allowing notifications. When a person browsing online lands on Silenthill24 dot biz, usually by following a rogue ad on a page, they see an... Read more

May 23, 2022
Qlln Malware Seeks Personal Files for Encryption Like Other Known Ransomware Threats screenshot

Qlln Malware Seeks Personal Files for Encryption Like Other Known Ransomware Threats

Qlln is a malware threat that has ransomware capabilities where it may seek out a vulnerable system by hiding in a spam email attachment. Upon the computer user opening the spam email attachment that’s malicious they... Read more

May 24, 2022
What is the Zpps Malware Threat and How to Remove Zpps screenshot

What is the Zpps Malware Threat and How to Remove Zpps

Zpps is a malware threat associated with ransomware where it may load on a PC and cause additional issues. The Zpps may act much like traditional ransomware threats as it could encrypt files and demand a ransom be... Read more

May 24, 2022
Elbie Ransomware screenshot

Elbie Ransomware

Cybercriminals are busy infiltrating vulnerable computers with malware threats that earn them money. Ransomware has been one of their primary weapons for extorting money from victimized computer users, and the Elbie... Read more

May 24, 2022
How to Remove Horsemagyar Ransomware screenshot

How to Remove Horsemagyar Ransomware

Horsemagyar is the unusual name of a newly discovered strain of file-encrypting malware. There is no indication that the ransomware belongs to any of the major groups or families of ransomware. Horsemagyar would... Read more

May 23, 2022
TeamBot Dropper Delivers Additional Malware screenshot

TeamBot Dropper Delivers Additional Malware

TeamBot is the name of a malware dropper that is used to deliver a number of additional threats. The way malware droppers operate is usually connecting to the command and control server controller by the hackers and... Read more

May 23, 2022
Predator Mobile Malware Targets Android Phones screenshot

Predator Mobile Malware Targets Android Phones

Security researchers with Google's Threat Analysis Group (TAG) have recently published detailed information on a piece of mobile malware affecting Android devices. The mobile malware is named PEDATOR and was used in... Read more

May 20, 2022
Loading...