Back Up & Store Your Important Files in the Cloud.
Access your files whenever and wherever you want and stop worrying about catastrophic data loss. Learn more →
Our products offer data encryption, cloud integration and a number of other features to help you organize your data, plan your day, and get through the rest of your everyday tasks with ease. We incorporate a multitude of technologies with the goal of affording you an easier, more hassle-free online life.
Our products’ design ensures that they work whenever and wherever you need them.
Comprehensive solutions to real-world problems.
A straightforward setup process and a sleek, intuitive interface come as standard in all our applications.
Get tips, how-to guides, videos and the latest news in data security, password management, mobile security, data breaches, hacking and much more. Visit the Cyclonis blog to read more.
Upon investigation of the "LiquidEther Airdrop," we have determined that it is fraudulent. Multiple webpages are hosting this scam, which falsely promises rewards to eligible users. When users attempt to claim the... Read more
Our research team encountered the myxioslive.com webpage while browsing suspicious websites. This malicious website promotes browser notification spam and redirects users to other potentially unsafe sites. Visitors... Read more
We identified Vehu ransomware during our analysis of new malware samples. Our investigation revealed that Vehu is part of the Djvu ransomware family. It encrypts files and appends the ".vehu" extension to filenames,... Read more
Awayurl.net is the domain of a fake search engine, which is being promoted by the TraceUrl rogue browser extension discovered during our investigation into deceptive websites. Although TraceUrl claims to redirect... Read more
Upon reviewing the claim-hyperliquid.xyz website, we discovered that it promotes a cryptocurrency airdrop; however, further investigation revealed that claim-hyperliquid.xyz is a fraudulent page posing as a legitimate... Read more
Researchers have described a technique called TunnelVision, which allows threat actors to monitor network traffic of victims by leveraging the same local network. This bypass method, referred to as "decloaking," has... Read more
We have analyzed the email in question and determined that it is a deceptive message intended to deceive recipients into compromising their computers. It contains a harmful attachment used for distributing malware.... Read more
Mac users are facing a new threat in the form of adware called "VersionTrust," which belongs to the notorious family of AdLoad adware variants. This insidious software is designed to infiltrate Mac systems, compromise... Read more
The North Korean threat group known as Kimsuky has been observed using a new Golang-based malware called Durian in targeted cyber attacks against two South Korean cryptocurrency companies. According to security... Read more
Our research team uncovered this counterfeit Google Sheets browser extension during an investigation into deceptive websites. This malicious software masquerades as a spreadsheet application from the web-based Google... Read more
Upon investigation, it was determined that a website purporting to offer gifts for the Valorant video game is fraudulent. This scam falsely promises users one thousand Radianite points for free, operating as a... Read more
After analyzing the website token-usdt.com, we identified it as a scam site that replicates tether.to with the intention of deceiving visitors into believing they can participate in an airdrop to receive free... Read more
Upon investigation of the "Riot Games & Twitch Giveaway" promotion website, we have determined that it is a deceptive scheme exploiting the names of legitimate companies (Riot Games and Twitch, respectively) to... Read more
Paaa is a variant of ransomware belonging to the Djvu family. This ransomware encrypts files to prevent victims from accessing them and adds the ".paaa" extension to filenames. It also creates a ransom note named... Read more
The alarming pop-up advertisements claiming a serious virus infection you might run into while browsing usually are a sign of a misleading site. These alarming alerts are actually schemes designed to deceive... Read more
Upon analyzing the Bc20 application, we identified it as part of the Pirrit adware family. Once installed, Bc20 displays intrusive advertisements and may quietly gather various types of user data. Therefore, affected... Read more
EnigmaWave is a type of ransomware that functions by encrypting data, making it inaccessible, and then demanding payment for decryption. The ransomware program alters the filenames of encrypted files by appending the... Read more
During our examination of new file sample submissions, we came across the DataUpdate application. Upon analysis, we identified this application as adware, specifically belonging to the AdLoad malware family. Adware is... Read more
The Free Basic Cyclonis Backup plan gives you 2 GB of cloud storage space with full functionality! No credit card required. Need more storage space? Purchase a larger Cyclonis Backup plan today! To learn more about our policies and pricing, see Terms of Service, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.
FREE Trial: 30-Day One-Time Offer! No credit card required for Free Trial. Full functionality for the length of the Free Trial. (Full functionality after Free Trial requires subscription purchase.) To learn more about our policies and pricing, see EULA, Privacy Policy, Discount Terms and Purchase Page. If you wish to uninstall the app, please visit the Uninstallation Instructions page.