The Security Blog From Gridinsoft

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions, quishing attacks have emerged as a new threat that hides…

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes by IntelBroker published a message about selling a huge piece…

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma Stealer and Rhadamanthys malware, specifically targeting Taiwanese Facebook…

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability in the Indirect Branch Predictor Barrier (IBPB). Although the flaw,…

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following…

LockBit Ransomware is Back After Europol Takedown

LockBit is Back With New Claims and Victims

The story around LockBit ransomware takedown on February 19 continues…

MrB Ransomware Analysis & Removal Guide

MrB Ransomware (.mrB Files) – Analysis & File Decryption

MrB ransomware is a new Dharma ransomware sample, discovered on…

NCA Claims LockBit Takedown in Operation Cronos

LockBit Ransomware Taken Down by NCA

On February 19, 2024, LockBit ransomware was taken down by…

SYSDF Ransomware (Dharma) Description & Removal Guide

SYSDF Ransomware (.SYSDF Files) – Malware Analysis & Removal

SYSDF is a ransomware-type program that belongs to the Dharma…

MIT Students' Data Leaked On the Darknet

MIT Hacked, Students’ Data Sold on the Darknet

On February 13, 2024, a post on a Darknet forum…

US DoJ stops Warzone RAT and arrests its operators

Warzone RAT Dismantled, Members Arrested

In an international law enforcement operation, the U.S. Department of…

HijackLoader Malware Comes With Sophisticated Evasion Tactics

HijackLoader Malware Comes With New Evasion Methods

The HijackLoader malware has added new defense evasion techniques. Other…

Critical Update for the Fortinet FortiOS SSL VPN Remote Code Execution Vulnerability

New Fortinet VPN RCE Flaw Discovered, Patch ASAP

Fortinet has issued a warning about a recently discovered critical…

Critical Boot Loader Vulnerability in Shim Puts Linux Systems in Danger

Shim Bootloader Vulnerability Affects Linux Systems

Researchers have identified a critical vulnerability in Shim, a widely-used…

Ov3r_Stealer Malware Spreads Through Facebook Job Listings

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

A new Windows malware called Ov3r_Stealer is spreading through fake…

One More Flaw in Ivanti VPN Products

Third Ivanti VPN Vulnerability Under Massive Exploitation

Experts have discovered a third Server Side Request Forgery (SSRF)…

Docker API Vulnerability Exploited in Commando Cat Attacks

Docker API Vulnerability Exploited in Cryptojacking Campaign

A new campaign named “Commando Cat” uses a Docker API…

AI Assistant

Hello! 👋 How can I help you today?