Gridinsoft Security Lab

Is it safe to use AI deepnude sites? Simple Explanation

AI Deepnude Websites – Are they Safe & Trustworthy?

Stephanie AdlamDec 30, 20246 min read

The development of generative AI that is capable of creating images gave an expected push for AI deepnude web services.…

What is Movidown PUA? Detailed Analysis

Movidown Unwanted Application

Stephanie AdlamAug 20, 20246 min read

Movidown is an Unwanted Application that initially mimics a utility for controlling fan speed. However, beneath this shell, it has the capabilities of a dropper malware, which it right away uses to deploy browser hijackers. This functionality, together with the deep access to the system, creates potential risks for much more severe malware to get […]

"Managed by Your Organization" in Browser Explained & Removal Guide

“Managed by Your Organization” – How to Remove From Chrome?

Stephanie AdlamNov 2, 20244 min read

“Managed by your organization” is a line that appears when the web browser is attacked by browser hijackers. This malware abuses a legitimate Chrome policy to make itself impossible to delete. And it turns out to be pretty effective – without a special approach, all browser plugins remain untouchable after this line appears. In this […]

PUA:Win32/SBYinYing Virus Analysis

PUA:Win32/SBYinYing

Stephanie AdlamAug 9, 20247 min read

PUA:Win32/SBYinYing is a potentially unwanted application (PUA) that is often bundled with certain cracked games. It may display ads to users or redirect them to potentially harmful websites, which puts it in the same line with adware and browser hijackers. Most often, user get infected with that malware after downloading cracked software. PUA:Win32/SBYinYing Overview PUA:Win32/SBYinYing […]

Disable Windows Defender - Windows 10/11 Guide

How to Disable Windows Defender? Windows 10 & 11 Guide

Stephanie AdlamAug 16, 20244 min read

Disabling Microsoft Defender is often thought of Windows users all around the world. Despite undoubtedly being a solid antivirus tool, it may cause issues here and there, forcing such a wish. In this guide, I’ll explain how to fully disable Microsoft Defender. How to Disable Microsoft Defender in Windows 10/Windows 11 There are two ways […]

Trojan:Win32/Qhosts.L Analysis & Removal Guide

Trojan:Win32/Qhosts

Stephanie AdlamAug 9, 20246 min read

Trojan:Win32/Qhosts is malware that provides remote access to the target system and modifies the Hosts file. It is primarily distributed through illegal activation tools found on torrent and warez sites. While the mentioned interaction with the system configuration file as a definitive feature, it is capable of much, much more unpleasant activities. Trojan:Win32/Qhosts Overview Trojan:Win32/Qhosts […]

What is PUABundler:Win32/YandexBundled? Removal Guide

PUABundler:Win32/YandexBundled

Stephanie AdlamAug 9, 20247 min read

PUABundler:Win32/YandexBundled is a detection of potentially unwanted application (PUA) associated with the Russian company Yandex. It is typically distributed as bundled software with repackaged or free programs. While being less dangerous than malware, it can still threaten both the privacy and normal operations of one’s computer. What is PUABundler:Win32/YandexBundled? PUABundler:Win32/YandexBundled is a generic detection name […]

Docker Engine Auth Bypass Vulnerability Abuses Authentication Plugins

Docker Engine Authentication Bypass Vulnerability Exploited

Stephanie AdlamJul 25, 20243 min read

Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain attack. This vulnerability allows attackers to bypass AuthZ authorization plugins, effectively mutilating any auth control. For this and several other reasons, the flaw got the max severity score possible (10.0). Critical Docker Engine Flaw Allows […]

Hamster Kombat Tap-Game Players Targeted in Malware Spreading

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Stephanie AdlamJul 25, 20245 min read

Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings. Malicious actors steal confidential data and infect inattentive players with malware. Due to the technical aspects of Hamster Kombat, these fraudulent schemes are highly successful. Hamster Kombat Tap-Game Players Targeted in Malware Spreading ESET researchers […]

What is Trojan:BAT/PSRunner.VS!MSR? Removal Guide

Trojan:BAT/PSRunner.VS!MSR

Stephanie AdlamJul 23, 20245 min read

Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a compromised system. It does not do much hurt by itself and rather serves for payload delivery & running. Aside from that, it does some basic system reconnaissance and gains persistence for the further payloads. Trojan:BAT/PSRunner.VS!MSR Overview Trojan:BAT/PSRunner.VS!MSR is a type of malware detection […]

Jellyfish Loader Malware Overview

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

Stephanie AdlamJul 21, 20245 min read

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader called Jellyfish Loader. It has some strange features that may signify that it is still at the development stage. Nonetheless, this malware is capable of deploying other malicious software in a selection of ways. Jellyfish […]

What is Trojan:Script/Downloader!MSR? Removal Guide

Trojan:Script/Downloader!MSR

Stephanie AdlamJul 17, 20244 min read

Trojan:Script/Downloader!MSR is a malicious script that downloads other malware onto the target system. It is most commonly spread through illegal software and fake documents, and is capable of deploying pretty much any malicious program. Due to the complexity and the use of obfuscation, the exact malicious script may remain undetected, while the Defender will display […]

Trojan:Win32/Bearfoos.B!ml Malware Analysis & Removal

Trojan:Win32/Bearfoos.B!ml

Stephanie AdlamJul 21, 20247 min read

Trojan:Win32/Bearfoos.B!ml is a detection of Microsoft Defender associated with data stealing malware. It may flag this malware due to the specific behavior patterns, assigning that name even to malicious programs of well-known families. As the Defender uses machine learning for this detection, it can sometimes be a false positive. Trojan:Win32/Bearfoos.B!ml Overview Trojan:Win32/Bearfoos.B!ml is a detection […]