The Security Blog From Gridinsoft

Erikos Scam Shops Abuse Meta Ads

Eriakos Scam in Facebook Ads Targets Personal and Banking Data

Fraudsters are using fake websites and Facebook Ads to steal users’ financial data. Researchers named the campaign Eriakos after the…

BangBros Leak Exposes 12 Million User Records

BangBros, a studio and platform specializing in adult content, leaked information about the users registered on their website. The database…

Fake Google Authenticator Abuses Google Ads, Spreads Malware

Cybercriminals promote a fake Google Authenticator page through ads in Google Search. According to the report, they use a tricky…

Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page

Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware to Chinese users. A Google Chrome phishing download…

2024 Olympic Cyberattack Risks: What Should We Expect

The Olympic Games is a massive sporting event that attracts billions of people worldwide. But where there are thousands of…

Zimbra vulnerability exploited in the wild

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting…

ALPHV Ransomware Gang Reports MeridianLink to SEC

ALPHV/BlackCat Ransomware Reports MeridianLink Hack To SEC

Ransomware Gang ALPHV Takes Unprecedented Step: Files SEC Complaint Over…

VMware Issues Urgent Warning About Unpatched Critical Cloud Director Vulnerability

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, a key player in virtualization services, is reaching out…

IPStorm Botnet Stopped by FBI, Key Operator Detained

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and…

Plume Data Breach Published on the Darknet

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on…

Reptar Vulnerability in Intel Allows to Escalate Privileges

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors…

Moneris claimed by Medusa ransomware

Moneris Hacked, Medusa Ransomware Claims

Canadian fintech giant Moneris has been claimed to have been…

Trojanized CPU-Z Installer Promoted in Google Ads

Malicious CPU-Z Copy Is Spread In Google Search Ads

Attackers are again abusing the Google Ads platform to distribute…

Boeing data breach

LockBit Ransomware Exposes Boeing’s 50GB of Data Leaked

In a cybersecurity nightmare, Boeing, a global aerospace and defense…

SLP Vulnerability Used in DDoS attacks

SLP DDoS Amplification Vulnerability Actively Exploited

In a recent development, the U.S. Cybersecurity and Infrastructure Security…

SecuriDropper Attack Androids Devices

SecuriDropper Bypasses Google Play & Android Defenses

SecuriDropper is a rare example of the Android dropper malware…

North Korean Hackers Push New Wave of Concerns

North Korean Hackers Force US, Japan & South Korea Consultations

Increased activity by North Korean state hackers forced South Korea,…

AI Assistant

Hello! 👋 How can I help you today?