Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Arc Browser Hype Hijacked: Google Ads Scam Infects Windows Users with Malware
Cybercriminals target the Arc browser for Windows launch with a malvertising campaign, tricking users into downloading trojanized installers. Always verify download sources and avoid Google Ads to stay safe.

Hot Take:
When your highly-anticipated browser launch gets hijacked by cybercriminals, it’s like throwing a grand opening party and forgetting to lock the doors. Cybersecurity 101, folks!
Key Points:
- Cybercriminals exploited the launch of the Arc browser for Windows with a malvertising campaign.
- Malicious ads on Google Search redirected users to fake domains resembling the official Arc site.
- Trojanized installer files downloaded additional malicious payloads via MEGA’s API.
- Malwarebytes found the malicious files were stealthy, making it hard for victims to detect the infection.
- The final payload is suspected to be an info-stealer, but this is not confirmed.