The Security Blog From Gridinsoft

Fake CAPTCHA sites spread Lumma Stealer malware

Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked…

Temu Allegedly Hacked, Data Put on Sale On The Darknet

Chinese retailer Temu allegedly suffered a huge data breach. Hackers have put a leaked database for sale on the Darknet,…

Critical VMWare vCenter Server RCE Vulnerability Fixed

On Tuesday, September 17, Broadcom released a security update that fixes a critical remote code execution flaw in VMWare vCenter…

Amazon Prime Day Scams and Fake Amazon Websites

Amazon Prime Day scams is a name for fraudulent schemes that parasite on a sell-off day of the famous retailer.…

Crypto Recovery Services

Crypto recovery scams are a specific type of fraudulent activity that piggybacks on victims of cryptocurrency scams. Con actors offer…

Jellyfish Loader Malware Overview

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

A new threat has been discovered in the form of…

CrowdStrike Falcon Causes Windows Machines to Crash

CrowdStrike Falcon Bug Causes Windows Outages Around the Globe

Bug in the recent update of the CrowdStrike Falcon caused…

Rite Aid has reported a data breach

Rite Aid Hacked, Data of 2.2 Million Customers Leaked

In June 2024, Rite Aid, a US-based chain of pharmacy…

BadPack Android Malware Avoids Detection via Header Malformation

BadPack Malware for Android Parasites on APK Installers

A new research reveals a novel approach at hiding malware…

AT&T Hacked, 90 Million Customers Affected in Data Leak

AT&T Hacked in April, All Wireless Customers Affected

AT&T, one of the US biggest network operators, confirms a…

Microsoft Fixed Several Critical Flaws in June Patch Tuesday

Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited

Microsoft has released its monthly security update, addressing 142 vulnerabilities…

AsyncRAT Mimics eBook Files to Spread

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that…

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the…

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote…

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud…

GrimResource Attack Targets Microsoft Management Console

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered,…

Binance Smart Contracts Abused in Malware Delivery

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2,…