The Security Blog From Gridinsoft

Russia's "Bulletproof" Hosting Empire

Media Land Sanctioned: US, UK, and Australia Crush Russian “Bulletproof” Hosting Empire

November 20, 2025 — In a rare display of international cooperation that cybercriminals probably didn’t see coming, the United States,…

Chinese Hackers Used Claude AI to Automate 90% of Cyber Espionage Campaign

Chinese cyber spies automated 90% of their attack campaign using Claude AI. Not a drill, not a prediction—this actually happened.…

ClickFix Gets Creative: Abusing a 1971 Protocol to Deliver Malware

ClickFix is so widespread these days that you can find the most exotic things in it. In one campaign, researchers…

The Chronicles of ClickFix: 2025’s Biggest Hit Keeps Evolving

Meet ClickFix, the social engineering attack that’s become the cybercriminal’s golden ticket in 2025. Microsoft’s latest report drops a bombshell:…

PROMPTFLUX: AI Malware Using Gemini for Self-Modification

Malware that rewrites itself on the fly, like a shape-shifting villain in a sci-fi thriller. That’s the chilling vision Google’s…

Cybercriminal campaign exploiting Booking.com

Cybercriminal campaign exploiting Booking.com

Cybercriminals are running a two-pronged attack targeting both travelers and…

Noodlophile Stealer How Fake AI Tools Hijack Hype to Steal Crypto Credentials

Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data

Just when you thought cybercriminals couldn’t get more creative, they’ve…

Inside Octalyn Stealer How This Silent Threat Steals Passwords Crypto Browser Data

Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data

Octalyn Stealer is an information-stealing malware that’s currently being promoted…

Elon Musk’s “Double Your Crypto” Scams: Too Good To Be True

Elon Musk’s “Double Your Crypto” Scams: Too Good To Be True

So apparently, some people still believe internet strangers will double…

Investment Scams on Facebook How Cybercriminals Filter and Target Victims

Investment Scams on Facebook: How Cybercriminals Filter and Target Victims

Investment scams continue to evolve in sophistication, with cybercriminals deploying…

BreachForums is Down, Forum Admins Published a PGP-Signed Message

BreachForums is Down, Admins Posted a PGP-Signed Message

BreachForums, an infamous Darknet forum, has gone offline recently, only…

$GROK Presale Scam: Crypto Investment Fraud

$GROK Presale Scam: Crypto Investment Fraud

The $GROK Presale Scam tricks people into investing in a…

CVE-2025-21605 Redis Denial of Service Vulnerability

CVE-2025-21605 Redis DoS Vulnerability Discovered, Patch Now

So Redis walks into a bar and the bartender asks,…

Ad Fraud Campaign Scallywag Disrupted Following Peak 1.4M Requests per Day Traffic

WordPress Ad-Fraud Plugins and the Scallywag Operation

Cybersecurity researchers have found a large-scale ad fraud scheme called…

MITRE Warns CVE Program Funding Expires on April 16

MITRE Warns CVE Program Funding Expires on April 16

MITRE, a key player in cybersecurity awareness, has issued a…

Vulnerability in Vite Tool Allows for Arbitrary File Read, Install Updates Now

CVE-2025-32395 Vite Vulnerability Exposes Sensitive Files

A newly discovered Vite vulnerability, a widely used frontend development…

Google Releases Fixes for Two Android Zero-Day Flaws

Google Releases Two Android Zero-Day Fixes, Exploited in the Wild

Google addressed two critical Android zero-day vulnerabilities in Android, identified…

AI Assistant

Hello! 👋 How can I help you today?