The Security Blog From Gridinsoft

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

SpyLoan Virus Found in Loan Apps on Google Play Store

Experts reported the discovery of a new set of 15 malicious mobile apps in the Google Play store that contain…

INTERPOL Reports Finishing Huge Anti-Financial Crime Operation

A recent international law enforcement initiative has resulted in the arrest of over 5,500 individuals linked to financial crimes. This…

Wazawaka Hacker Arrested in Kaliningrad, Russia

Russian authorities have arrested the infamous hacker Mikhail Pavlovich Matveev, widely known by his alias, Wazawaka. His involvement allegedly helped…

Bootkitty Bootkit Discovered in the Wild, Targeting Linux

Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI bootkit for Linux systems. The tool, called Bootkitty, is considered…

Corrupted Word Documents Phishing Attacks Avoid Security Checks

Hackers found a new way of bypassing the email security filters and anti-malware software – corrupted MS Word documents. As…

Ivanti EPM RCE vulnerability fixed, patch now

RCE Vulnerability in Ivanti Endpoint Manager Uncovered, Patch Now

In the latest update release, Ivanti disclosed the selection of…

Hacker Uploads Data Leaked in MOVEit Breaches

Hacker Leaks Corporate Data Stolen in 2023 MOVEit Breaches

The hacker, known as Nam3L3ss, posted the data of over…

BBVA Bank Hacked, Data Posted on the Darknet Forum

Hacker Leaks BBVA Bank Data, Including User Details

On November 11, 2024 a hacker known as Gatito_FBI_NZ published…

"Verify you are human" scam website explained

Verify you are Human Scam

While browsing the Web, you can occasionally get to a…

Palo Alto Network Expedition Tool Exploited

Palo Alto Network Expedition Tool Exploited, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an…

Exploiting AI for Voice-Based Scams

GPT-4o Used for Scams and Voice Phishing

Voice-based scams grow increasingly sophisticated with the integration of advanced…

Is UC Browser credible and safe?

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find…

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions,…

Hacker Leaks Nokia Data after the Contractor Hack

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes…

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into…

Spectre Flaw Still Haunts Intel and AMD Chips, Putting Security at Risk

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability…

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website…