Gridinsoft Security Lab

Disable Windows Defender - Windows 10/11 Guide

How to Disable Windows Defender? Windows 10 & 11 Guide

Stephanie AdlamAug 16, 20244 min read

Disabling Microsoft Defender is often thought of Windows users all around the world. Despite undoubtedly being a solid antivirus tool,…

Tax Season Scams in 2024: What Should You Expect

Tax Season Scams On The Rise, Beware!

Stephanie AdlamOct 15, 20246 min read

Tax season has already begun, and so did tax season scams. The IRS annually lists its top tax scams to help taxpayers protect themselves. Most tax season scams involve identity theft, but there could be a lot of other consequences. Awareness of these schemes can help consumers protect themselves, and we will go into more […]

Mispadu Stealer Exploits Windows SmartScreen Flaw, Targets LATAM

Mispadu Banking Trojan Exploits SmartScreen Flaw

Stephanie AdlamFeb 8, 20244 min read

Recent research uncovers a new sample of Mispadu malware that uses a SmartScreen bypass flaw to integrate itself into the system. This banking trojan from 2019 uses the vulnerability discovered in late 2023 to target mainly LATAM users.ContentsMispadu Trojan Uses SmartScreen BypassWhat is Mispadu Malware?How to Protect Yourself? Mispadu Trojan Uses SmartScreen Bypass The extensive […]

CrackedCantil Dropper Malware Symphony

CrackedCantil Dropper Delivers Numerous Malware

Stephanie AdlamFeb 3, 20246 min read

CrackedCantil is a unique dropper malware sample that operates with a wide variety of malware families. Infecting with one may effectively mean up to five other malware types running in the system. Let’s break down on what it is, how it spreads, and why it is so dangerous.ContentsWhat is CrackedCantil?Overview of distribution waysCrackedCantil Delivers Droppers, […]

Definition of Bootkit

What is a Bootkit? Explanation & Protection Guide

Stephanie AdlamJan 26, 20245 min read

Bootkit is a rather unusual and unspoken, though widely used kind of malware. These advanced malware types operate beneath the surface, embedding themselves in a computer’s boot sector, allowing them to activate before the operating system (OS) even starts. But why do they need such a deep integration? And where are they used? Let’s find […]

TikTok Shopping Scams Gaining Momentum - How to Avoid?

TikTok Shopping Scams On The Rise: Tips to Avoid

Stephanie AdlamSep 17, 20246 min read

TikTok shopping scams is a new attack vector on online shoppers. Immense popularity of the Chinese social network led to addition of shopping functionality to the application. This, however, attracted fraudulent actors who aim at parasitizing on peoples’ unawareness about potential scams. In this article, I am going to explain how these scams work, and […]

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

Stephanie AdlamJan 3, 202412 min read

In the intricate landscape of cybersecurity, comprehending the various forms of malware is crucial. This article offers an in-depth look at the most pervasive malware types, from Loaders to Keyloggers. We’ll explore their mechanisms, impacts, and how they compromise digital security, providing you with the knowledge to better safeguard against these ever-evolving cyber threats.ContentsLoaderLoader (droppers) […]

PUABundler:Win32/PiriformBundler - How to Remove?

PUABundler:Win32/PiriformBundler

Stephanie AdlamAug 29, 20244 min read

PUABundler:Win32/PiriformBundler is the detection of an unwanted program, developed and issued by Piriform Software. While applications from this developer aren’t inherently malicious, the bundled software they carry and their questionable behavior make them less than desirable.ContentsWhat is PUABundler:Win32/PiriformBundler?PUABundler:Win32/PiriformBundler AnalysisIs PiriformBundler Dangerous?How to protect against PiriformBundler and unwanted programs? What is PUABundler:Win32/PiriformBundler? PiriformBundler is a detection […]

Rugmi Loader Surfaces, Spreads Infostealers

Novice Rugmi Loader Delivers Various Spyware

Stephanie AdlamDec 28, 20235 min read

The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact capable of delivering any malware type. Rugmi boasts of its unusual structure, which makes it rather promising among other loaders.ContentsWhat is Rugmi Loader?Loader Malware ExplainedHow dangerous is Rugmi Loader?Protect Yourself Against Malware What is Rugmi […]

What to Do If I Got Scammed - Guide

What Should You Do When You Get Scammed?

Stephanie AdlamDec 28, 20237 min read

As online scams become not only more widespread, but also more sophisticated, it appears to be rather easy to become a victim of one. But what should you do in such a case? Is it possible to get your money back? Let me show you every step you should do.ContentsYou Got Scammed – Where It […]

Sextortion Scams Explained & Ways to Avoid

What is Sextortion? Explanation, Signs & Ways to Avoid

Stephanie AdlamDec 1, 20238 min read

Sextortion is a specific email phishing tactic that was around for quite some time. Over the last few years though its popularity skyrocketed, and some novice technologies make me concerned regarding possible sextortion approaches in future. Let me explain what I mean, what this scam is about, and how to detect and avoid it.ContentsWhat is […]

Rude Stealer: Analysis of a Rare Java Malware

Rude Stealer Targets Data from Gamer Platforms

Stephanie AdlamNov 25, 20235 min read

A newly discovered Java-based stealer named Rude has emerged, encapsulated within a Java Archive (JAR) file. It employs a range of sophisticated functionalities and focuses on stealing sensitive data from gaming platforms such as Steam, Discord, and other browsers.ContentsRude Stealer OverviewInitial Infection and Technical AnalysisStealing Steam User DataExtracting Discord Tokens And Browser DataCapturing System InformationData […]

What is Windows Defender Security Warning?

What is Microsoft Security Warning Scam?

Stephanie AdlamNov 8, 20236 min read

Fraudsteds massively employ Microsoft Azure hosting to start Microsoft Security scam pages. They range from a scary warning that blocks your browser window to a phishing pages, indistinguishable from real. Let’s see the most typical types of these scams and their features.ContentsWhat is Windows Defender Security Warning?How Does This Scam Work?Fake Login PageTech Support ScamHow […]