Increased productivity and a simpler online experience are at the core of our products’ design.

Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.

Reliable

Our products’ design ensures that they work whenever and wherever you need them.

Useful

Comprehensive solutions to real-world problems.

Easy to Use

A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.

Latest Posts

Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.

Deadglyph Backdoor Deployed by Stealth Falcon APT screenshot

Deadglyph Backdoor Deployed by Stealth Falcon APT

Cybersecurity experts have unearthed an advanced covert backdoor called Deadglyph, which was previously undiscovered and utilized by the threat actor Stealth Falcon as part of a cyber espionage operation. In a recent... Read more

September 29, 2023
Animated BG Browser Extension screenshot

Animated BG Browser Extension

The extension called Animated BG functions as a deceptive add-on that showcases dynamic browser wallpapers. Our examination of this software revealed that it is, in fact, a browser hijacker. It makes changes to... Read more

September 29, 2023
News-fiyame.com Displays Fake Anti-Bot Check screenshot

News-fiyame.com Displays Fake Anti-Bot Check

A deceptive website known as News-fiyame.com employs a misleading tactic by prompting visitors to click "Allow" to confirm they are humans and not bots. However, this action unintentionally subscribes users to push... Read more

September 29, 2023
Meduza (MedusaLocker) Ransomware screenshot

Meduza (MedusaLocker) Ransomware

Meduza, which is a type of ransomware from the MedusaLocker family, was identified during our analysis of malware samples. Its primary function is to encrypt files, and it appends a specific extension (such as... Read more

September 28, 2023
ZenSearch Rogue Browser Extension screenshot

ZenSearch Rogue Browser Extension

After assessing the ZenSearch application, it has been determined that its primary function is to act as a browser hijacker, with the objective of promoting the counterfeit search engine known as... Read more

September 28, 2023
Fetchzilla Rogue Browser Extension screenshot

Fetchzilla Rogue Browser Extension

Fetchzilla is a browser extension of the adware variety, which our researchers stumbled upon during an investigation into suspicious websites. It's marketed as a tool to simplify the downloading of media, like images,... Read more

September 28, 2023
Mzhi Ransomware Will Lock Your Files screenshot

Mzhi Ransomware Will Lock Your Files

During the examination of new malware samples, a variant of the Djvu ransomware, known as Mzhi, has been identified. Mzhi operates by encrypting files and adjusting their file names by appending the ".mzhi" extension... Read more

September 29, 2023
Go Blocker Browser Extension screenshot

Go Blocker Browser Extension

During our examination of the Go Blocker browser extension, we observed its tendency to display irritating advertisements, categorizing it as adware. Additionally, Go Blocker possesses the capability to access and... Read more

September 29, 2023
PositivePlatform Mac Adware screenshot

PositivePlatform Mac Adware

In the course of our routine examination of new file submissions, we came across an application known as PositivePlatform. Our investigation revealed that this app falls into the category of ad-supported software,... Read more

September 29, 2023
Mzre Ransomware Encrypts Files screenshot

Mzre Ransomware Encrypts Files

While examining new malware samples, we came across Mzre, a ransomware variation associated with the Djvu family. Mzre encrypts files, adds the ".mzre" extension to their file names, and creates a ransom note labeled... Read more

September 28, 2023
'Switch To New Version' Email Scam screenshot

'Switch To New Version' Email Scam

After a thorough examination, it has been determined that the intention behind this email is to engage in deceptive tactics aimed at coaxing recipients into disclosing their personal information. These emails are... Read more

September 28, 2023
NIGHT CROW Ransomware Asks for Ten-Dollar Ransom screenshot

NIGHT CROW Ransomware Asks for Ten-Dollar Ransom

Our research team came across the NIGHT CROW ransomware during our examination of new file submissions. This malicious software has been designed with the purpose of encrypting data and then demanding payment in... Read more

September 27, 2023
Mzqt Ransomware Encrypts Most File Types screenshot

Mzqt Ransomware Encrypts Most File Types

While analyzing malware samples, we came across a ransomware variant known as Mzqt. This ransomware utilizes file encryption to restrict access to files and appends the ".mzqt" extension to file names. Additionally,... Read more

September 29, 2023
Microsoft Ending Promotion Award Email Scam screenshot

Microsoft Ending Promotion Award Email Scam

Upon our examination of this email, we have identified it as a fraudulent message that falsely presents itself as originating from Microsoft. The individuals orchestrating this deception aim to trick recipients into... Read more

September 29, 2023
ZenRAT Malware Distributed by Spoofing Legitimate App screenshot

ZenRAT Malware Distributed by Spoofing Legitimate App

A new type of malicious software known as ZenRAT has surfaced in the wild. It is distributed through deceptive installation packages that mimic a legitimate password manager application. Enterprise security firm... Read more

September 28, 2023
ProgramProcessor Mac Adware screenshot

ProgramProcessor Mac Adware

Our research team came across the ProgramProcessor application while conducting a routine examination of new file submissions. Upon investigating this software, we determined that it falls into the category of... Read more

September 28, 2023
Emberenchanter.top Misleads Visitors Into Accepting Ads screenshot

Emberenchanter.top Misleads Visitors Into Accepting Ads

Emberenchanter.top employs deceptive tactics to persuade users to activate push notifications, which it then utilizes to inundate devices with disruptive advertisements. This website employs counterfeit browser error... Read more

September 28, 2023
LostTrust Ransomware Targets Businesses screenshot

LostTrust Ransomware Targets Businesses

We came across a ransomware variant known as LostTrust during our examination of malware samples. LostTrust's primary objective is to encrypt data, rendering it inaccessible to victims. Additionally, LostTrust appends... Read more

September 27, 2023

View More


Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.