Increased productivity and a simpler online experience are at the core of our products’ design.

Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.

Reliable

Our products’ design ensures that they work whenever and wherever you need them.

Useful

Comprehensive solutions to real-world problems.

Easy to Use

A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.

Latest Posts

Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.

Recilopang.xyz Shows Fake Virus Warning Messages screenshot

Recilopang.xyz Shows Fake Virus Warning Messages

The alarming pop-up advertisements claiming a serious virus infection you might run into while browsing usually are a sign of a misleading site. These alarming alerts are actually schemes designed to deceive... Read more

May 10, 2024
Bc20 Adware screenshot

Bc20 Adware

Upon analyzing the Bc20 application, we identified it as part of the Pirrit adware family. Once installed, Bc20 displays intrusive advertisements and may quietly gather various types of user data. Therefore, affected... Read more

May 10, 2024
EnigmaWave Ransomware Locks Infected Systems screenshot

EnigmaWave Ransomware Locks Infected Systems

EnigmaWave is a type of ransomware that functions by encrypting data, making it inaccessible, and then demanding payment for decryption. The ransomware program alters the filenames of encrypted files by appending the... Read more

May 10, 2024
DataUpdate Adware screenshot

DataUpdate Adware

During our examination of new file sample submissions, we came across the DataUpdate application. Upon analysis, we identified this application as adware, specifically belonging to the AdLoad malware family. Adware is... Read more

May 9, 2024
Girlzsportteam.top Pushes Unwanted Ads screenshot

Girlzsportteam.top Pushes Unwanted Ads

During an investigation of questionable websites, our researchers came across the girlzsportteam.top rogue page. Upon examination, we determined that this webpage prompts spam browser notifications and redirects users... Read more

May 9, 2024
ROOTROT Malware Used by Chinese Threat Actor screenshot

ROOTROT Malware Used by Chinese Threat Actor

The MITRE Corporation has provided additional information about a recent cyber attack, revealing that the earliest signs of intrusion date back to December 31, 2023. This attack, disclosed last month, targeted MITRE's... Read more

May 9, 2024
Awayurl.net Fake Search Engine screenshot

Awayurl.net Fake Search Engine

Awayurl.net is the domain of a fake search engine, which is being promoted by the TraceUrl rogue browser extension discovered during our investigation into deceptive websites. Although TraceUrl claims to redirect... Read more

May 10, 2024
Hyperliquid (HYPE) Airdrop Scam screenshot

Hyperliquid (HYPE) Airdrop Scam

Upon reviewing the claim-hyperliquid.xyz website, we discovered that it promotes a cryptocurrency airdrop; however, further investigation revealed that claim-hyperliquid.xyz is a fraudulent page posing as a legitimate... Read more

May 10, 2024
CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack screenshot

CVE-2024-3661 Vulnerability Exploited in TunnelVision Attack

Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more

May 10, 2024
Your System Has Been Cracked Email Scam screenshot

Your System Has Been Cracked Email Scam

Upon reviewing the "Your System Has Been Cracked" email, we identified it as spam promoting a sextortion scam. This deceptive email falsely alleges that the recipient's device was hacked by the sender, who claims to... Read more

May 9, 2024
Xam Ransomware Demands Payment in Tether Crypto screenshot

Xam Ransomware Demands Payment in Tether Crypto

Our researchers discovered the Xam ransomware during an examination of new file samples. Ransomware is a form of malicious software that encrypts files to demand payment for their decryption. After obtaining a sample... Read more

May 9, 2024

"Virus Activities Were Detected" Email Scam

Upon reviewing the email in question, titled "Virus Activities Were Detected", we have identified it as spam. This email falsely claims that virus-related activity has been detected on the recipient's account, with... Read more

May 8, 2024
Fake Google Sheets Extension screenshot

Fake Google Sheets Extension

Our research team uncovered this counterfeit Google Sheets browser extension during an investigation into deceptive websites. This malicious software masquerades as a spreadsheet application from the web-based Google... Read more

May 10, 2024
Valorant Gift Scam Preys on Gamers screenshot

Valorant Gift Scam Preys on Gamers

Upon investigation, it was determined that a website purporting to offer gifts for the Valorant video game is fraudulent. This scam falsely promises users one thousand Radianite points for free, operating as a... Read more

May 10, 2024
USDT NFT Airdrop Scam screenshot

USDT NFT Airdrop Scam

After analyzing the website token-usdt.com, we identified it as a scam site that replicates tether.to with the intention of deceiving visitors into believing they can participate in an airdrop to receive free... Read more

May 9, 2024
Hotsearch.io Hijacks Search Queries screenshot

Hotsearch.io Hijacks Search Queries

Hotsearch.io is a counterfeit search engine accessed through the HotSearch browser extension, which functions as a browser hijacker. This extension alters browser settings to trigger redirects to the hotsearch.io... Read more

May 9, 2024
Qeza Ransomware Locks Infected Systems screenshot

Qeza Ransomware Locks Infected Systems

Qeza is a type of ransomware belonging to the Djvu family. Ransomware is a type of malicious software that encrypts files and demands payment in exchange for decryption. Alongside encrypting files, Qeza appends the... Read more

May 9, 2024
App_updater Will Damage Your Computer Pop-Up screenshot

App_updater Will Damage Your Computer Pop-Up

In recent months, Mac users have encountered a rising threat in the form of adware disguised as a rogue browser extension named "App_updater". This deceptive software presents itself as a legitimate tool for updating... Read more

May 8, 2024

View More


Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.