Baxhit Crypto Scam
Baxhit operates like a fake cryptocurrency casino. It mimics legitimate gambling platforms with sleek interfaces, flashy games, and fake testimonials.…
Binkspin Crypto Scam
The Binkspin Crypto Scam lures you in with fake winnings and flashy dashboards—but once you deposit, scammers vanish. This site…
Topodat.info Hijacker
Beware of sudden redirects to fake gaming sites that expose you to scams and malware. Threat Summary Threat TypeBrowser Hijacker…
RomCom Malware
Stealthy malware used in espionage campaigns and targeted attacks RomCom Malware – Threat Summary Threat TypeRemote Access Trojan (RAT) /…
CurlyComradesAPT Malware
The CurlyComradesAPT malware is a high-level espionage threat tied to state-sponsored cyber operations. Known for its stealthy behavior and multi-layered payloads, this…
“Server Security Upgrade” Email Scam
Phishing scam disguised as a security upgrade request. Scam Summary Threat TypePhishing Email ScamAssociated EmailVaries (spoofed addresses like admin@domain.com)Detection NamesPhishing.Mail, Scam.Email,…
CryptoNexETH Voucher Scam
The CryptoNexETH Voucher Scam is a cryptocurrency-themed phishing campaign designed to trick users into visiting fake Ethereum reward or airdrop pages. These…
Charon Ransomware
Charon ransomware is a data-encrypting threat that locks your files and demands a ransom in exchange for a decryption key.…
Bobsvagene.club Hijacker
Redirect warnings and unwanted browser behavior from Bobsvagene.club Threat Overview Threat TypeBrowser Hijacker / Redirect / PUP (Potentially Unwanted Program)Associated…
Hotbwenoku.cc Scam Redirect
Hotbwenoku.cc is a deceptive website that tricks users into allowing browser push notifications. Once enabled, it bombards the system with…
“Powerball Lottery Organization 2025” Email Scam
Beware of fake lottery winnings – no, you didn’t win the Powerball. Scam Summary Threat TypeEmail Scam / Phishing FraudAssociated…
Zenoroll.com Scam
Excessive crypto bonuses, blocked withdrawals, and identity theft risk—here’s how to protect yourself. Quick Threat Summary of the Zenoroll.com Scam…
Sephicatielly.com
If your homepage or default search engine has suddenly changed, Sephicatielly.com is likely the culprit. Threat Summary – Sephicatielly.com Threat…
NAYM Token Airdrop Scam
Never fall for fake “airdrop” schemes that drain your crypto wallet A fraudulent website posing as a legitimate "NAYM Token…
DollarTub Scam
Be cautious of "get-paid-to" platforms with unclear rules and disappearing payouts. What Is the DollarTub Scam? DollarTub lures users with…
Claim Your Solana (SOL) Back Scam
Crypto scams like Claim Your Solana (SOL) Back look convincing but are crafted to deceive. The scam promises to “refund” you SOL…
CyberHazard Ransomware
CyberHazard Ransomware is a file-locking virus associated with the MedusaLocker family. It encrypts personal files using strong algorithms, appends the .cyberhazard extension, and…
Davixnaro.co.in Ads
Threat TypeNotification Spam / Deceptive AdwareDetection NamesAds by davixnaro.co.inSymptomsPersistent fake pop-up alerts, fake virus warnings, spam redirectsDamage & DistributionSocial engineering…
“Lottery Winnings Compensation” Email Scam
Cybercriminals are once again exploiting hope and confusion with a phishing campaign disguised as a “Lottery Winnings Compensation” email. The…
WinRAR CVE‑2025‑8088 Zero‑Day Vulnerability
A dangerous zero-day vulnerability in the Windows version of WinRAR (CVE‑2025‑8088) allows attackers to exploit directory traversal techniques—including alternate data…
Kremlin Ransomware
Warning: Kremlin Ransomware silently encrypts your files and extorts victims with ransom demands. Immediate action is essential to protect your data…
WNS Protect Pro
WNS Protect Pro is marketed as a PC optimization and protection tool, but in reality, it often causes more problems…
Qubetics Airdrop Scam
Warning: Wallet-draining crypto airdrop impersonates Qubetics — don’t connect and lose everything. The Qubetics Airdrop Scam masquerades as a legitimate crypto giveaway…
Revault Ransomware
Revault Ransomware Summary Threat TypeRansomware – File-encrypting malwareEncrypted File Extension.revaultRansom Note FilenameREADME.txtEmail Contactdecryption.revault@protonmail.comDetection NamesRansom:Win32/Revault, Trojan.Ransom.Revault, Revault.RansomSymptomsFiles renamed with .revault, ransom note…
$ONTO Migration & Reward Scam
The “$ONTO Migration & Reward” scam mimics the ONTO Wallet’s official site (onto.app), luring users with promises of token migration rewards. In…
Getilitcenter.com Adware
Getilitcenter.com disguises itself as a helpful prompt—claiming your browser is out-of-date or that you need to “prove you’re not a…
Session Expired Email Scam
Fake system notification warns of inactivity—which isn’t real. The Session Expired Email Scam pretends to be a system alert from your email…
“Secure Your Cloudflare Account” Scam
A deceptive phishing email warning you to “secure” your Cloudflare account—don’t take the bait. The “Secure Your Cloudflare Account” email…
Everviveres.com Ads
Warning: deceptive clickbait pushing spam notifications that can lead to scams What You Need to Know Everviveres.com masquerades as a…
Panadafteazzy.com Ads
Panadafteazzy.com isn’t malware—but a deceptive website that tricks you into enabling browser notifications. It disguises itself with fake “Click Allow…
“Bitcoin.com – 1 New Transaction Has Been Sent” Scam
Warning: You might receive an email saying you've got a pending Bitcoin transfer (like 1.375 BTC), but it’s a scam—don’t fall…
Solara Ransomware
Solara ransomware encrypts your files, demanding ransom for decryption. Immediate action is crucial—don’t delay. Threat Overview: Solara Ransomware CategoryDetailsThreat TypeRansomware,…
Foritatoginia.com Adware
Why Foritatoginia.com Should Set Off Alarms Foritatoginia.com is a deceptive, rogue site that tricks visitors into enabling browser notifications. Once…
Trojanwall.click Browser Hijacker
Trojanwall.click is a browser hijacker that spams fake virus alerts and tricks you into installing shady software. If your browser keeps…
SparkKitty Malware
SparkKitty malware is a recently discovered mobile threat that quietly infiltrates Android devices and runs in the background without user…
HunnyMe Scam
HunnyMe Scam – Quick Summary Threat TypePhishing Scam / Romance ScamAssociated EmailVaries – often spoofed or anonymizedDetection NamesPhishing.HunnyMe, Scam:RomanceBot, Fraud.Email.HunnyMeSymptomsAdult…
Zenoroll Casino Scam
Zenoroll Casino Scam – Quick Overview Threat TypePhishing / Online ScamAssociated EmailVaries – often cloaked or spoofedDetection NamesFraudulent Site, Phishing…
Jackpot MedusaLocker Ransomware
The Jackpot MedusaLocker ransomware is a dangerous file-encrypting malware strain that locks your personal data and demands a cryptocurrency ransom in return.…
“Microsoft Has Temporarily Suspended Your Account”
The "Microsoft Has Temporarily Suspended Your Account" pop-up is a tech support scam designed to trick users into calling a fake support…
Troxalioutarbah.com Adware
The Troxalioutarbah.com adware is a browser-based threat that spams users with fake system alerts, misleading ads, and push notifications. Once allowed, it…
“You Have Exhausted All of Your Available Email Storage” Scam
The “You Have Exhausted All of Your Available Email Storage” scam is a classic phishing scheme targeting unsuspecting email users with urgent…
Stylethreadhub.com Browser Hijacker
Stylethreadhub.com is a deceptive website tied to browser hijackers that force unwanted search redirects, inject intrusive ads, and manipulate browser…
LEVEL Ransomware
The LEVEL ransomware is a variant of the Phobos family that encrypts user files and appends the .LEVEL extension. Once embedded, it disables file…
Ritchmen’s PTE LTD Email Scam
Cybercriminals are sending out fake emails posing as Ritchmen's PTE LTD, a supposed logistics or shipping company, to trick recipients into…
RestoreMyData Ransomware
RestoreMyData ransomware is a dangerous file-locking virus that encrypts users' data and demands payment in Bitcoin to restore access. It…
Leet Stealer
Leet Stealer is a sophisticated information-stealing Trojan that emerged in late 2024 and evolved into a prominent Malware‑as‑a‑Service (MaaS) by 2025. This malware is…
Plague Backdoor
Plague is a highly evasive Linux backdoor disguised as a malicious PAM (Pluggable Authentication Module). It allows threat actors to silently…
Cybertron Ransomware
Cybertron Ransomware is a dangerous strain of malware from the MedusaLocker family. First identified in August 2025, it encrypts victims’…
PXA Stealer
PXA Stealer is a Python-based information-stealing malware that has rapidly spread worldwide since late 2024. It targets browsers, crypto wallets, VPN/FTP clients,…
BushBeater.app
BushBeater.app is a malicious application for macOS, categorized within the Pirrit adware family. It generates deceptive pop‑ups (often masquerading as…