Threats
Captcha-sourcecenter.com Pop-ups and Ads
Pop-up ads are nearly everywhere. However, there are many shades of pop-ups, with some much less desirable than others. The pop-ups associated with the domain captcha-sourcecenter dot com are of this kind. If you are... Read more
Remove Toon Explorer
Toon Explorer is a misleading browser add-on, which claims to offer users entertainment by regularly giving them access to cartoon-related content. However, the first red flag is the permissions that the Toon Explorer... Read more
Remove News-duboma.cc
News-duboma.cc is a shady website, which attempts to hijack browser notifications with the use of misleading messages and alerts. It good to mention that nobody would visit News-duboma.cc on their own. Instead, users... Read more
Indestroyer2 Malware Targets Ukrainian Industrial Control Systems
Indestroyer2 Malware is a malicious piece of software, which has been employed in attacks against Ukraine-based Industrial Control Systems (ICS.) The goal of the attackers is to take down important targets operating... Read more
Thispcprotected.com Pop-Up Scam
Thispcprotected.com is a scam website, which utilizes fake virus alerts and warnings to scare users into following the instructions seen on their screen. However, the instructions of Thispcprotected.com are certainly... Read more
Enemybot Botnet Goes After Routers and IoT Devices
The Mirai Botnet might just be one of the most impactful malware families to be released ever. The infamous threat was responsible for one of the largest botnets engaging in distributed-denial-of-service attacks, and... Read more
PIPEDREAM Malware Targets a Wide Range of Industrial Control Systems
Industrial Control Systems (ICS) is a term used to describe the collection of systems, networks, and devices used to automate certain industrial processes. Typically, ICS use highly specialized software and tooling,... Read more
Remove Star-search.xyz
Star-search.xyz is a dubious search service, which is being promoted through the help of Potentially Unwanted Programs (PUPs) and browser hijackers. Keep in mind that Star-search.xyz is perfectly safe to use, and it... Read more
Defender-scan.xyz Pop-Up Scam
Defender-scan.xyz is a malicious website, which pretends to host alerts and warnings from antivirus software. We assure you that random Web pages are not a reliable source of data about your computer's security and... Read more
Vomm Ransomware is an Updated STOP/Djvu Ransomware Variant
Vomm Ransomware is a file-locker, which is part of the STOP/Djvu Ransomware family. The goal of this malware attack is to damage the victim's files, and then ask them for a hefty ransom payment. After the Vomm... Read more
What are the Adspirit Ads?
Adspirit is an Internet marketing company based in Germany. However, its name appears to be associated with a large number of adware applications and intrusive advertisements, which bother users worldwide. The... Read more
META Infostealer is a New Stealer for Rent
Cybercriminals are always on the lookout for openings in a specific field of malware. Recently, such a place was opened when the developers of the Raccoon Stealer ceased their operations due to the conflict in... Read more
Remove Gilfillan Ransomware
The Gilfillan Ransomware is an updated variant of the VoidCrypt Ransomware family. The major changes that the criminals have introduced are a fresh ransom note, and suffix used to mark locked files. Otherwise, the... Read more
Remove Searchpoweronline.com
Searchpoweronline.com is a dodgy website, which claims to offer enhanced search services that everybody can enjoy. However, users who have worked with Searchpoweronline.com report that it provides dubious search... Read more
Remove HOUSELOCKER Ransomware
HOUSELOCKER Ransomware is a dangerous piece of malware whose victims are going to be in a lot of trouble. While most ransomware attacks end up encrypting the victim's files, there are a few samples, which work in a... Read more
Remove Hajd Ransomware
Hajd Ransomware is a file-locker that you do not want to mess with. If it gets a chance to infect your system, it will cause long-lasting damage to your files, preventing you from accessing them. The damage that the... Read more
Remove ColdStealer Malware
Cybercriminals are using a new piece of malware, which is called the ColdStealer Malware. This threat is able to steal information related to a dozen Web browsers, but its primary target are cryptocurrency wallets... Read more
Remove Ghas Ransomware
Ghas Ransomware is a variant of the STOP Ransomware, which encrypts a wide range of files, preventing anyone from accessing their contents. Unfortunately, the key required to undo the damage is held by Ghas... Read more