ThreatDown Powered by Malwarebytes
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
    • Products

    • Endpoint Detection & Response (EDR)
    • Endpoint Protection
    • Vulnerability Assessment
    • Patch Management
    • Application Block
    • DNS Filtering
    • Mobile Security
    • Services

    • Managed Detection & Response (MDR)
    • Managed Threat Hunting
    • Premium Support
    • Platforms

    • Nebula
    • Manage your organization’s endpoint security in a single-tenant console

      Nebula customer sign in >

    • OneView
    • Provides MSPs centralized visibility and management capabilities across customer sites

      OneView customer sign in >

    • Explore Partnerships
    • Review program benefits, innovative technology, channel first mentality

    • Managed Service Providers
    • Everything MSPs need to run their business seamlessly

    • Technology Partners
    • Explore our technology integrations

    • Resellers
    • Build growth, profitability, and customer loyalty

    • Retain and grow your business with tools, education, and support in the partner experience center.

      Sign in to PXC >

    • Threat Center
    • Learn about the latest threat news

    • Reports
    • Threat Detections
    • Executive POV
    • Glossary
    • Blog
    • Resource Center
    • Learn more about ThreatDown

    • Case Studies
    • Products & Review
    • Cybersecurity Tips & Tricks
    • Webinars
    • About Us
    • Dive into the threats that matter in the year of autonomous AI and “dark horse” ransomware.

      Download now >

    Pricing
    • Why ThreatDown

    • About Us
    • ThreatDown vs. Competition
    • Case Studies
    • ThreatDown named Product of the Year by MRG Effitas.

      Learn more >

    Get a quote
    Buy now
    Home > Threat Center > Threat Detections

    ThreatDown Threat Detections

    Detection Type

    • All types
    • Adware
    • Domain
    • FraudTool
    • Hijack
    • IP
    • Malware
    • OSX
    • Other
    • PUM
    • PUP
    • Ransomware
    • RiskWare
    • Rogue
    • Rootkit
    • Spyware
    • Trojan
    • Virus
    • Worm
    Threat Name
    Type
    Backdoor.Farfli
    Domain
    View detection details
    Ransom.WannaCrypt
    Ransomware
    View detection details
    Adware.NeoBar
    Adware
    View detection details
    Adware.NetAdapter
    Adware
    View detection details
    Adware.Linkury
    Adware
    View detection details
    Adware.LoadBlanks
    Adware
    View detection details
    Adware.LoadMoney
    Adware
    View detection details
    Adware.IStartSurf
    Adware
    View detection details
    Adware.ICLoader
    Adware
    View detection details
    Adware.InstallMonster
    Adware
    View detection details
    Adware.Graftor
    Adware
    View detection details
    Adware.GorillaPrice
    Adware
    View detection details
    Adware.HPDefender
    Adware
    View detection details
    Adware.Elex
    Adware
    View detection details
    Adware.SavingsCool
    Adware
    View detection details
    Adware.Social2Search
    Adware
    View detection details
    Adware.Tuto4PC
    Adware
    View detection details
    Adware.Ghokswa
    Adware
    View detection details
    Adware.Yontoo
    Adware
    View detection details
    Adware.DotDo
    Adware
    View detection details

    Posts pagination

    < 1 … 223 224 225 226 227 … 234 >
    ThreatDown Powered by Malwarebytes

    Products & Services

    Endpoint Detection & Response
    Endpoint Protection
    Managed Detection & Response
    Pricing

    Partners

    MSP
    Resellers
    Technology Partners
    Become a Partner

    Resources

    Threat Center
    Resource Center
    Blog
    Glossary

    Managed Services Terms & Conditions

    Managed Service Teams
    MTH Service Description
    MDR Service Description

    Support

    Nebula Support
    OneView Support

    Get in Touch

    Contact Us
    Schedule a Meeting
    Request a Demo

    ThreatDown Newsletter

    Get cybersecurity news and tips from our security experts in your mailbox.

  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2025 All Rights Reserved