API Security Gateway: Protecting Your Business from API Threats

Learn how an API security gateway can safeguard your business from API-based cyber threats. Discover its benefits, use cases, and…

ITFunk Research
4 Min Read

API Cactus‑Search.com Redirect

API Cactus‑Search.com is a browser hijacker that forcefully redirects your web searches through cactus‑search.com or api.cactus‑search.com. This potentially unwanted program (PUP)…

ITFunk Research
3 Min Read

Sorillus RAT

Sorillus RAT is a sophisticated Java-based remote access trojan (RAT) marketed as malware‑as‑a‑service. It targets Windows, macOS, and Linux systems,…

ITFunk Research
3 Min Read

SafeWatch Unwanted Application

SafeWatch is classified as a Potentially Unwanted Application (PUA)—often bundled with freeware or spread via deceptive pop-ups. While not overtly malicious,…

ITFunk Research
2 Min Read

DataLeak Ransomware

DataLeak is a potent ransomware threat from the MedusaLocker family, discovered June 16, 2025. It combines file encryption with data exfiltration,…

ITFunk Research
3 Min Read

AMERILIFE Ransomware

AMERILIFE is a recently identified ransomware strain that encrypts victims’ files, appending a .ameriwasted extension. Victims are then coerced into contacting hackers…

ITFunk Research
3 Min Read

The “Aetna Sent You A Secure Message” Email Scam

The “Aetna Sent You A Secure Message” email scam is a phishing campaign designed to trick users into revealing their…

ITFunk Research
3 Min Read

Chewbacca Ransomware

Chewbacca is a ransomware strain that encrypts significant files—like documents, photos, databases—with a unique extension and demands a ransom for decryption. It…

ITFunk Research
3 Min Read

Mobile Threat Defense: Protecting Your Business in the Mobile-First Era

Safeguard your company’s data with mobile threat defense solutions. Learn how MTD protects against malware, phishing, and other mobile threats.

ITFunk Research
4 Min Read

IAM for Multi-Cloud Environments

Discover how Identity and Access Management (IAM) secures multi-cloud environments and protects your business from cyber threats.

ITFunk Research
4 Min Read