The Security Blog From Gridinsoft

Amazon Prime Day - An Opportunity for Scammers

Amazon Prime Day Scams and Fake Amazon Websites

Amazon Prime Day scams is a name for fraudulent schemes that parasite on a sell-off day of the famous retailer.…

Crypto Recovery Scams: How to Protect Yourself from Secondary Fraud

Crypto recovery scams are a specific type of fraud targeting individuals who have already lost money in cryptocurrency scams. In…

Ads(exe).finacetrack(2).dll Virus Explained

Ads(exe).finacetrack(2).dll is a detection name that you can see on websites pretending to be malware infection alerts from Microsoft. Such…

Chase Bank Glitch: Fast Earning Scheme Explained

Chase Bank Glitch is a recent viral campaign that goes on different social media, particularly including TikTok and Instagram. In…

Critical RCE Vulnerability in GiveWP WordPress Plugin

A critical vulnerability has been discovered in the GiveWP WordPress plugin that leaves thousands of websites exposed. The vulnerability is…

InfectedSlurs Botnet exploits vulnerabilities to spread Mirai

InfectedSlurs Botnet Exploits Zero-Days to Spread Mirai Malware

The “InfectedSlurs Botnet,” a sophisticated cyber threat, has been uncovered…

DarkGate and PikaBot May be the New QakBot

DarkGate and Pikabot Copy the QakBot Malware

According to researchers, the phishing campaign promoting the DarkGate and…

Phobos Ransomware Mimics VX-Underground

Phobos Ransomware Mimics VX-Underground Researchers

A new version of Phobos ransomware claims to be developed…

Hackers accessed sensitive health data of more than 8 million Welltok patients

Welltok Data Breach Exposes More Than 8 million Patients

Welltok, a healthcare Software as a Service (SaaS) provider, has…

LitterDrifter Worm Spreads on USB Drives

LitterDrifter – Russia’s USB Worm Targeting Ukrainian Entities

LitterDrifter USB worm, intricately linked to the notorious Gamaredon group…

ActiveMQ Vulnerability Exploited in the Wild to Install Cryptominer Malware

Apache ActiveMQ Vulnerability Exploited In The Wild

Recent Apache ActiveMQ vulnerability, that allows for remote code execution,…

Zimbra vulnerability exploited in the wild

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting…

ALPHV Ransomware Gang Reports MeridianLink to SEC

ALPHV/BlackCat Ransomware Reports MeridianLink Hack To SEC

Ransomware Gang ALPHV Takes Unprecedented Step: Files SEC Complaint Over…

VMware Issues Urgent Warning About Unpatched Critical Cloud Director Vulnerability

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, a key player in virtualization services, is reaching out…

IPStorm Botnet Stopped by FBI, Key Operator Detained

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and…

Plume Data Breach Published on the Darknet

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on…

Reptar Vulnerability in Intel Allows to Escalate Privileges

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors…

AI Assistant

Hello! 👋 How can I help you today?