Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
In late April 2024, Google announced that enhancements to its security processes prevented 2.28 million privacy-violating apps from being published on its Google Play store in 2023. The company attributed this success... Read more
The "Agreement Update" email is a form of phishing, posing as a notification about changes to terms of service. Its purpose is to trick recipients into visiting a phishing website designed to steal login credentials,... Read more
Upon analyzing the malware, it became evident that Tuborg is ransomware, distinct from the Tuborg Brewery, designed to encrypt files. Besides encrypting files, Tuborg alters the desktop wallpaper and presents a ransom... Read more
Upon reviewing this "Account Protection" email, it has been identified as spam designed to deceive recipients into visiting a phishing website aimed at stealing email account log-in credentials. This deceptive email... Read more
Our researchers identified Lovelypush.club as a rogue webpage during a routine examination of suspicious websites. Upon investigation, we determined that Lovelypush.club engages in browser notification spamming and... Read more
The Lazarus Group, associated with North Korea, utilized familiar tactics involving fake job offers to distribute a new remote access trojan (RAT) called Kaolin RAT during attacks aimed at specific individuals in Asia... Read more
Upon examination of the website mage-airdrop-merlinchain.com, we identified it as a deceptive site promoting a fraudulent cryptocurrency giveaway (airdrop). This scam website falsely presents itself as the top... Read more
Upon examining the questionable site phoureel.com, our research team discovered that it operates as a rogue webpage promoting browser notification spam and redirecting users to potentially unreliable or malicious... Read more
A new cyber threat named Muddling Meerkat has been detected engaging in sophisticated activities involving the domain name system (DNS) since October 2019. This appears to be an attempt to evade security measures and... Read more
Binance is a prominent cryptocurrency exchange that facilitates buying, selling, and trading various digital currencies. Established more than five years ago, Binance offers services like spot trading, futures... Read more
Our researchers identified the mydotheblog.com rogue webpage during an investigation into untrustworthy websites. Upon examination, we determined that this site promotes browser notification spam and redirects users... Read more
Since early 2023, Akira ransomware has targeted more than 250 victims globally and collected over $42 million in ransom payments, according to CISA, the FBI, Europol, and the Netherlands’ National Cyber Security... Read more
Thenetaservices.com is a deceptive website created to push browser notification spam and potentially redirect users to questionable or harmful sites. Our team identified thenetaservices.com during an examination of... Read more
Upon reviewing new file samples, our team identified a new ransomware variant named Robaj. When executed in our testing environment, this malware encrypted files and generated a ransom note named "readme.txt" to... Read more
During our examination of likudservices.com, we observed that this deceptive website employs clickbait techniques to trick visitors into granting permission to display notifications. Similar to other misleading pages... Read more
We discovered the Silver Wave application bundled with an installer promoted by a misleading webpage, accessed through a redirect from a torrenting site linked with rogue advertising networks. Alongside the Silver... Read more
In our investigation of the Wormhole malware, we determined that it functions as ransomware with the primary objective of encrypting files and demanding ransom for decryption. Alongside encrypting files, Wormhole... Read more
In late April 2024, Microsoft reported that Russian online efforts to influence the upcoming U.S. presidential election have begun within the last 45 days, albeit at a slower pace compared to previous election cycles.... Read more
The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.
FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.