Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Users have reported encountering intrusive pop-up notifications on their computers and mobile devices, urging them to grant permission for notifications or enable push notifications from a site named Eprianerphy.com.... Read more
After assessing the CacheOperator application, we identified concerning behaviors, including the display of unwanted advertisements and potential data collection. Consequently, CacheOperator has been classified as... Read more
HomuWitch operates as a form of ransomware, encrypting data and demanding payment for decryption. HomuWitch would encrypt files by appending a ".homuencrypted" extension to their titles. For instance, a file... Read more
Gotosearchnow.com functions as a browser hijacker that commonly comes bundled with free software. Upon installation, it alters browser settings such as the homepage and default search engine. Moreover, it may modify... Read more
Our research team identified the VirtualRotator application as a member of the AdLoad malware family, specifically categorized as adware, which operates by conducting intrusive advertisement campaigns. Adware, short... Read more
If your browser consistently redirects to the Altairaquilae.com site, it is likely that an undesired browser extension or a malicious program has been installed on your device. Altairaquilae.com is a website that... Read more
Our researchers uncovered GridMapper during a routine examination of new file submissions to the VirusTotal platform. Upon investigation, it was determined that GridMapper is a form of adware associated with the... Read more
A freshly open-sourced tool for network mapping known as SSH-Snake has been repurposed by malicious actors for illicit purposes. Sysdig researchers revealed that SSH-Snake, identified as a self-modifying worm,... Read more
In recent reports, numerous users have shared instances of receiving intrusive pop-up notifications on their computers and mobile devices, urging them to grant permission for notifications or activate push... Read more
During the examination of new malware samples, we identified a variant of the GlobeImposter ransomware family, named GoodMorning. Once infiltrating a system, GoodMorning commences the encryption of files and appends... Read more
Security researchers have discovered a new 'influence operation' targeting Ukraine that utilizes spam emails to spread disinformation related to the war. The activity, known as Operation Texonto, has been linked to... Read more
During our examination of the Cinema Buzz application, we identified its practice of coercing users to visit and utilize cinema-buzz.com by modifying their web browser settings, a behavior commonly known as browser... Read more
Jkwerlo is categorized as ransomware, functioning with the intent to encrypt data and demand payment for decryption. When a Jkwerlo sample was executed, it initiated the encryption process on files. Unlike many... Read more
The United States is offering substantial rewards for information regarding cybercriminals associated with the recently dismantled LockBit ransomware operation, but law enforcement agencies assert they have already... Read more
While exploring websites of questionable quality, our researchers stumbled upon the FoodsIdea browser extension, presented as a convenient tool for accessing online cooking recipes. Upon examination, we determined... Read more
WantToCry is a type of ransomware designed to encrypt data and modify filenames by adding the extension ".want_to_cry." Upon encryption, the ransomware presents victims with a ransom note named "!want_to_cry.txt,"... Read more