Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
According to SentinelLabs, there is a new toolset called AlienFox that attackers are using to gather credentials for various cloud service providers, including AWS SES and Microsoft Office 365. This modular toolset is... Read more
Upon examination, our team has concluded that the email in question is a fraudulent message intended to deceive its recipients into revealing their confidential data. The email is camouflaged as an HR department... Read more
In the course of our investigation, we uncovered Jycx, a type of ransomware that utilizes file encryption and modifies file names by appending the ".jycx" extension. Additionally, it creates a ransom note file named... Read more
Dark Power is a type of ransomware that uses encryption to prevent victims from accessing their files. It also alters the filenames by appending the ".dark_power" extension and creates a ransom note in the form of a... Read more
Upon inspection, we have discovered that yourcoolwords.com utilizes misleading tactics to deceive visitors into allowing it to display notifications. Moreover, this website may redirect users to other untrustworthy... Read more
Ask You is an application that can be installed on Macintosh systems and is considered suspicious. If a user is constantly receiving ads and has this application installed, it indicates that the system is infected... Read more
In the course of our PhasePure testing, we discovered that it exhibits invasive advertising, causing us to classify it as adware. Furthermore, PhasePure is equipped to access confidential data. It is worth noting that... Read more
Upon testing Robo Tab, our team discovered that it operates as a browser hijacker, which modifies web browser settings and promotes a fake search engine called search.robo-tab.com. This extension may also collect... Read more
During our investigation of suspicious websites, we discovered Totalprotection-2023.store, a fraudulent webpage that promotes browser notification spam and scams. Totalprotection-2023.store has the ability to redirect... Read more
Upon installing ArchiveTask, our team discovered that its primary function is to display irritating advertisements, leading us to classify it as adware. It's worth noting that users may unknowingly download and... Read more
Upon investigating the SAI assistant browser extension, our team discovered that it alters a web browser's settings to promote a phony search engine, search.extjourney.com, which classifies it as a browser hijacker.... Read more
Hairysquid is a type of ransomware that encrypts files and changes their file names by appending the ".Hairysquid" extension. It's a new variant of the Mimic ransomware and also generates a ransom note called... Read more
D7k is a form of ransomware that is programmed to encode all files on the targeted device and adds the ".D7k" extension to the end of each encrypted file's name. Additionally, D7k generates a text file named... Read more
Upon evaluating the My Weather browser extension, we have found that it operates as a browser hijacker, even though it claims to offer easy access to weather forecasts. Once installed, My Weather changes the browser... Read more
Rn is a type of malicious software known as ransomware, which uses encryption to prevent users from accessing their files. Along with encrypting files, Rn also alters the filenames by appending the extension ".rn" and... Read more
Our team identified grakorte.com as a website that aims to deceive its visitors into subscribing to notifications from it. Grakorte.com also has a history of redirecting visitors to other unreliable pages. Our team... Read more
During our investigation of search-alpha.com, we discovered that it is a phony search engine that displays search results from other search engines. It is actually a variation of searchmarquis.com, and these fake... Read more
Our team recently discovered Sus ransomware while analyzing malware samples. We found that Sus is a variant of the Chaos ransomware, which encrypts data and changes the filenames of all encrypted files by appending... Read more