Increased productivity and a simpler online experience are at the core of our products’ design.

Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.

Reliable

Our products’ design ensures that they work whenever and wherever you need them.

Useful

Comprehensive solutions to real-world problems.

Easy to Use

A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.

Latest Posts

Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.

LiquidEther Airdrop Scam screenshot

LiquidEther Airdrop Scam

Upon investigation of the "LiquidEther Airdrop," we have determined that it is fraudulent. Multiple webpages are hosting this scam, which falsely promises rewards to eligible users. When users attempt to claim the... Read more

May 13, 2024
Myxioslive.com Misleading Website screenshot

Myxioslive.com Misleading Website

Our research team encountered the myxioslive.com webpage while browsing suspicious websites. This malicious website promotes browser notification spam and redirects users to other potentially unsafe sites. Visitors... Read more

May 13, 2024
Vehu Ransomware Locks Infected Systems screenshot

Vehu Ransomware Locks Infected Systems

We identified Vehu ransomware during our analysis of new malware samples. Our investigation revealed that Vehu is part of the Djvu ransomware family. It encrypts files and appends the ".vehu" extension to filenames,... Read more

May 13, 2024
Awayurl.net Fake Search Engine screenshot

Awayurl.net Fake Search Engine

Awayurl.net is the domain of a fake search engine, which is being promoted by the TraceUrl rogue browser extension discovered during our investigation into deceptive websites. Although TraceUrl claims to redirect... Read more

May 10, 2024
Hyperliquid (HYPE) Airdrop Scam screenshot

Hyperliquid (HYPE) Airdrop Scam

Upon reviewing the claim-hyperliquid.xyz website, we discovered that it promotes a cryptocurrency airdrop; however, further investigation revealed that claim-hyperliquid.xyz is a fraudulent page posing as a legitimate... Read more

May 10, 2024
CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack screenshot

CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack

Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more

May 10, 2024
Messages In Soundbox Email Scam screenshot

Messages In Soundbox Email Scam

We have analyzed the email in question and determined that it is a deceptive message intended to deceive recipients into compromising their computers. It contains a harmful attachment used for distributing malware.... Read more

May 13, 2024
VersionTrust Adware screenshot

VersionTrust Adware

Mac users are facing a new threat in the form of adware called "VersionTrust," which belongs to the notorious family of AdLoad adware variants. This insidious software is designed to infiltrate Mac systems, compromise... Read more

May 13, 2024
Durian Malware Linked to Kimsuky North Korean Threat Actor screenshot

Durian Malware Linked to Kimsuky North Korean Threat Actor

The North Korean threat group known as Kimsuky has been observed using a new Golang-based malware called Durian in targeted cyber attacks against two South Korean cryptocurrency companies. According to security... Read more

May 13, 2024
Fake Google Sheets Extension screenshot

Fake Google Sheets Extension

Our research team uncovered this counterfeit Google Sheets browser extension during an investigation into deceptive websites. This malicious software masquerades as a spreadsheet application from the web-based Google... Read more

May 10, 2024
Valorant Gift Scam Preys on Gamers screenshot

Valorant Gift Scam Preys on Gamers

Upon investigation, it was determined that a website purporting to offer gifts for the Valorant video game is fraudulent. This scam falsely promises users one thousand Radianite points for free, operating as a... Read more

May 10, 2024
USDT NFT Airdrop Scam screenshot

USDT NFT Airdrop Scam

After analyzing the website token-usdt.com, we identified it as a scam site that replicates tether.to with the intention of deceiving visitors into believing they can participate in an airdrop to receive free... Read more

May 9, 2024
Riot Games & Twitch Giveaway Scam screenshot

Riot Games & Twitch Giveaway Scam

Upon investigation of the "Riot Games & Twitch Giveaway" promotion website, we have determined that it is a deceptive scheme exploiting the names of legitimate companies (Riot Games and Twitch, respectively) to... Read more

May 13, 2024
Paaa Ransomware Encrypts Affected Files screenshot

Paaa Ransomware Encrypts Affected Files

Paaa is a variant of ransomware belonging to the Djvu family. This ransomware encrypts files to prevent victims from accessing them and adds the ".paaa" extension to filenames. It also creates a ransom note named... Read more

May 13, 2024
Recilopang.xyz Shows Fake Virus Warning Messages screenshot

Recilopang.xyz Shows Fake Virus Warning Messages

The alarming pop-up advertisements claiming a serious virus infection you might run into while browsing usually are a sign of a misleading site. These alarming alerts are actually schemes designed to deceive... Read more

May 10, 2024
Bc20 Adware screenshot

Bc20 Adware

Upon analyzing the Bc20 application, we identified it as part of the Pirrit adware family. Once installed, Bc20 displays intrusive advertisements and may quietly gather various types of user data. Therefore, affected... Read more

May 10, 2024
EnigmaWave Ransomware Locks Infected Systems screenshot

EnigmaWave Ransomware Locks Infected Systems

EnigmaWave is a type of ransomware that functions by encrypting data, making it inaccessible, and then demanding payment for decryption. The ransomware program alters the filenames of encrypted files by appending the... Read more

May 10, 2024
DataUpdate Adware screenshot

DataUpdate Adware

During our examination of new file sample submissions, we came across the DataUpdate application. Upon analysis, we identified this application as adware, specifically belonging to the AdLoad malware family. Adware is... Read more

May 9, 2024

View More


Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.