The Security Blog From Gridinsoft

Fake Google Authenticator App Spreads Through Ads

Fake Google Authenticator Abuses Google Ads, Spreads Malware

Cybercriminals promote a fake Google Authenticator page through ads in Google Search. According to the report, they use a tricky…

Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page

Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware to Chinese users. A Google Chrome phishing download…

2024 Olympic Cyberattack Risks: What Should We Expect

The Olympic Games is a massive sporting event that attracts billions of people worldwide. But where there are thousands of…

India Post SMS Phishing Targets Mobile Users in India

Massive complaints come from Indian users regarding a new wave of SMS phishing scams, particularly targeting iPhones. They mimic delivery…

Docker Engine Authentication Bypass Vulnerability Exploited

Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain…

SecuriDropper Attack Androids Devices

SecuriDropper Bypasses Google Play & Android Defenses

SecuriDropper is a rare example of the Android dropper malware…

North Korean Hackers Push New Wave of Concerns

North Korean Hackers Force US, Japan & South Korea Consultations

Increased activity by North Korean state hackers forced South Korea,…

Socks5Systemz Dropper Malware Overview

Socks5Systemz Proxy Service Infects 10,000 Systems Worldwide

A proxy botnet, “Socks5Systemz”, uses malware loaders to infiltrate computers…

Are Top Maine Lobster Ads Real?

Top Maine Lobster Scam on Facebook

Another fraudulent scheme related to the sale of seafood has…

Boeing Hacked By LockBit Gang

Boeing Hack Confirmed, LockBit Group Resposible

Boeing, a major aircraft manufacturer and aerospace & defence contractor…

Malicious WhatsApp Mods Aim Middle East Countries

Malicious WhatsApp Mods Spread Through Telegram

Some WhatsApp mods, which are unofficial versions of the app,…

BIG-IP Vulnerabilities Allow For RCE and SQL Injection

New F5 BIG-IP Vulnerabilities Exploited In The Wild

Two new vulnerabilities in F5 BIG-IP reportedly allow for remote…

Kaspersky and WeChat Bans in Canada

WeChat and Kaspersky Ban in Canada – What You Should Know?

The Canadian government has instituted a ban on the use…

Atlassian Uncovers a New Vulnerability in Confluence

New Confluence Vulnerability Leads to Unauthorised Access

Another vulnerability in the flagship product of Atlassian corporation, Confluence,…

Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?

Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?

Octo Tempest, a financially-motivated hacking group, has been labeled “one…

IoT Malware Attacks Skyroket in 2023

IoT Malware Attacks Grow by 400% in 2023

IoT malware has been a major concern over the last…

WinRAR RCE Vulnerability Exploited in the Wild

WinRAR Vulnerability Allows Arbitrary Code Execution

Over the past few weeks, Google’s Threat Analysis Group (TAG)…

AI Assistant

Hello! 👋 How can I help you today?