Fonix ransomware uses the extension pattern model that is similar to Ouroborus Fonix ransomware (a.k.a. FonixCrypter) has been uncovered in early June 2020 by a famous ransomware researcher Micahel Gillespie[1]. The first sample of this deadly dangerous virus has been uploaded into the VirusTotal[2] scanner a day ago, which showed a […]

Fonix ransomware


iPhone virus is the threat that targets iOS devices and can lead to a serious malware attack iPhone virus can sneak into the system undetected and run in its background without any notice iPhone virus can sneak into the system undetected and run in its background without any notice iPhone […]

iPhone virus


ElvisPresley ransomware – a data locking virus that stems from a well-known malware family ElvisPresley ransomware is a data locking malware that threatens to delete files in certain time intervals if ransom is not paid within 24 hours ElvisPresley ransomware is a data locking malware that threatens to delete files […]

ElvisPresley ransomware



Videovor.com ads – the program that should provide the service of video converting online but is related to shady advertisers Videovor.com is the PUP related to ad-supported sites and commercial content creators that push their products and rely on revenue generation, online traffic redirects. This site provides you a service of […]

Videovor.com ads


Utatity – an adware-type application that generates intrusive ads and actively promotes PUPs Utatity (alternative name Utatity not Utility) is the name of an adware-type application developed by Software Informer in 2016. Since it’s release, many people expressed concern on various forums about the legitimacy of the tool and its actual purpose. […]

Utatity virus


System takeover is possible through new SAP Adaptive Server Enterprise vulnerabilities  Flaws in SAP Adaptive Server Enterprise (ASE) allow unauthorized users to gain full control of the database and operating systems in some cases,[1] according to new research conducted by the Trustwave team.[2] These six flaws in the Sybase Adaptive Server […]

Researchers reveal that patched SAP ASE flaws could lead to ...



Nlah ransomware is the newest file encryption virus of Djvu ransomware family that might cause the loss of important data for its users Nlah ransomware, first discovered by Michael Gillespie[1], is the latest family member of the Djvu ransomware family, which is positioned 229th in the list. Just like its ancestor, […]

Nlah ransomware


Goo.glesafe.com search can take control over the web browser to promote sponsored websites and track browsing history Goo.glesafe.com is a misleading Portuguese search engine that has been around since 2015. It’s classified as a browser hijacker and potentially unwanted application (PUA) as it tends to replace the web browser’s start […]

goo.glesafe.com virus


Mazy Search is a browser hijacker that actively collects and shares user data for marketing purposes Mazy Search is a potentially unwanted application that stets the browser status to “Managed by your organization” Mazy Search is a potentially unwanted application that stets the browser status to “Managed by your organization” […]

Mazy Search



Quick Driver Updater is the system tool that uses false-positive results, so people can believe their device is affected or has problems Quick Driver Updater is the system tool that makes effort to trick people into thinking their machines are affected by the outdated software or drivers that get corrupted. […]

Quick Driver Updater