The Security Blog From Gridinsoft

Odyssey Stealer

Odyssey Stealer: Russian ‘Love Trump’ Malware Replaces Ledger Live Crypto Wallet App

A new macOS malware campaign is targeting users through social engineering, masquerading as legitimate Cloudflare security verification. The Odyssey Stealer…

Cybercriminal campaign exploiting Booking.com

Cybercriminals are running a two-pronged attack targeting both travelers and hotel staff through the Booking.com platform, according to security research…

Noodlophile Stealer: Cybercriminals Hijack AI Hype to Steal Your Data

Just when you thought cybercriminals couldn’t get more creative, they’ve found a way to weaponize our collective obsession with AI.…

Octalyn Stealer: How This Threat Steals Passwords, Crypto & Browser Data

Octalyn Stealer is an information-stealing malware that’s currently being promoted on GitHub – because apparently, even cybercriminals believe in open-source…

Elon Musk’s “Double Your Crypto” Scams: Too Good To Be True

So apparently, some people still believe internet strangers will double their money for free. Even better when those “strangers” are…

CVE-2025-24071 Windows File Explorer Spoofing Vulnerability Overview

CVE-2025-24071 Windows File Explorer Spoofing Vulnerability Uncovered, Patch Now

Microsoft uncovered the information about a critical vulnerability in Windows…

MassJacker Malware Targets Pirated Software Users

MassJacker Malware

Cybersecurity researchers have found MassJacker, a new, previously undocumented malware.…

Jaguar Land Rover Hacked In Two Steps, Customer Data Leaked

Jaguar Land Rover Data Breach Involved Two Attacks

Jaguar Land Rover suffered a significant data breach. Two hackers…

X DDoS Attack Overview

Threat Actor Behind X DDoS Attack Revealed

The X DDoS Attack, reported on March 10, 2025, caused…

CISA Has Added Five Vulnerabilities To Its KEV List

CISA Adds 5 Exploited Vulnerabilities, Patch ASAP

CISA recently updated its Known Exploited Vulnerabilities catalog, adding five…

LummaStealer and SmartLoader Use AI-Powered GitHub Repos

SmartLoader, LummaStealer Abuse Fake GitHub Repositories

A new campaign has been discovered where malicious actors are…

What is CVE-2025-27607?

Python JSON Logger Vulnerability Exposes Millions of Users

The CVE-2025-27607 vulnerability was discovered in Python JSON Logger. Its…

Broadcom Fixes VMWare ESXi, Workstation Vulnerabiltiies

VMWare ESXi Vulnerabilities Exploited, Patch Now

Broadcom has published a report on the discovery of three…

Frauds Promote Trading Scam With AI Bots in YouTube Ads

Frauds Promote Trading Scam With AI Bots in YouTube Ads

Attackers use AI-generated videos featuring credible crypto experts to create…

Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger

Signal Linked Devices Abused by Russian Intelligence

A new fraudulent campaign to hijack Signal accounts has been…

StaryDobry ruins New Year’s Eve, delivering miner instead of presents

StaryDobry Malware Hides in Pirated Games, Deploys XMRig

A major malware campaign named StaryDobry infected gamers by distributing…

Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHA

Fake CAPTCHA Abuses PDF and SEO Poisoning

Cybercrime actors misuse search ads to distribute fraudulent PDF files,…

AI Assistant

Hello! 👋 How can I help you today?