Motivational Quotes Rogue Browser Extension screenshot

Motivational Quotes Rogue Browser Extension

Upon our investigation, we examined the Motivational Quotes application and uncovered it functions as a browser hijacker. Browser hijackers commonly promote unreliable or counterfeit search engines, and Motivational... Read more

June 16, 2023
LMAO Ransomware Asks for $800 in Ransom screenshot

LMAO Ransomware Asks for $800 in Ransom

During an examination of newly discovered files, our team of researchers came across a ransomware variant called LMAO. This particular malware, which is based on the Chaos ransomware, is specifically designed to... Read more

June 15, 2023
Adsforyoupro.com Attempts to Spam Ads Through Fake Captcha screenshot

Adsforyoupro.com Attempts to Spam Ads Through Fake Captcha

During our research, we unveiled that adsforyoupro.com employs a deceptive tactic to entice visitors into granting permission for displaying notifications. Additionally, adsforyoupro.com has the ability to redirect... Read more

June 15, 2023
What is DeveloperEngine Adware? screenshot

What is DeveloperEngine Adware?

While investigating potentially unwanted files, our team came across the DeveloperEngine adware. This particular adware belongs to the AdLoad malware family and is specifically designed to conduct intrusive... Read more

June 15, 2023
Anxz Ransomware - Currently More Wiper Than Ransomware screenshot

Anxz Ransomware - Currently More Wiper Than Ransomware

During our investigation of new submissions, our researchers came across a ransomware program called Anxz. This malicious software, which is based on the Chaos ransomware, functions by encrypting data and demanding... Read more

June 14, 2023
Ransomware Hackers and Scammers Exploit Cloud Mining for Cryptocurrency Laundering screenshot

Ransomware Hackers and Scammers Exploit Cloud Mining for Cryptocurrency Laundering

According to recent findings, it has been revealed that ransomware actors and cryptocurrency scammers are now utilizing cloud mining services to launder digital assets, joining nation-state actors in this abusive... Read more

June 16, 2023
BuSaveLock Ransomware Will Encrypt Your Files screenshot

BuSaveLock Ransomware Will Encrypt Your Files

Our research team recently discovered a ransomware variant called BuSaveLock, which belongs to the MedusaLocker family. Its primary objective is to encrypt files and demand payment in exchange for decrypting them.... Read more

June 15, 2023
LockBit Ransomware Actors Made Over $90 Million Since 2020 screenshot

LockBit Ransomware Actors Made Over $90 Million Since 2020

LockBit, a notorious ransomware-as-a-service (RaaS) operation, has managed to extort a staggering $91 million from various U.S. organizations through hundreds of attacks since 2020. A joint bulletin published by... Read more

June 15, 2023
Skuld Infostealer Malware Used Against Targets Across the World screenshot

Skuld Infostealer Malware Used Against Targets Across the World

Skuld, a newly discovered information stealer written in Golang, has successfully compromised Windows systems in Europe, Southeast Asia, and the United States. According to an analysis by Trellix researcher Ernesto... Read more

June 15, 2023
Adstopc.com Hides Ads Behind Fake Bot Check screenshot

Adstopc.com Hides Ads Behind Fake Bot Check

During our examination of adstopc.com, our team made the discovery that it utilizes deceptive tactics to obtain permission for sending notifications. Additionally, adstopc.com possesses the capability to redirect... Read more

June 15, 2023
Beware of the Space Backgrounds Pictures Browser Hijacker screenshot

Beware of the Space Backgrounds Pictures Browser Hijacker

During our examination of deceptive web pages, our team made a significant discovery regarding the "Space backgrounds pictures" browser extension. This extension is marketed as a tool that offers attractive... Read more

June 15, 2023
Stealth Soldier Malware Used in Cyberespionage screenshot

Stealth Soldier Malware Used in Cyberespionage

In North Africa, a series of highly targeted espionage attacks have been carried out using a newly developed backdoor called Stealth Soldier. The cybersecurity firm Check Point, in a technical report, described... Read more

June 14, 2023
Loading...

Cyclonis Backup Details & Terms

The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.

Cyclonis Password Manager Details & Terms

FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.