The Security Blog From Gridinsoft

LummaStealer and SmartLoader Use AI-Powered GitHub Repos

SmartLoader, LummaStealer Abuse Fake GitHub Repositories

A new campaign has been discovered where malicious actors are leveraging AI to craft fake GitHub repositories. They are used…

Python JSON Logger Vulnerability Exposes Millions of Users

The CVE-2025-27607 vulnerability was discovered in Python JSON Logger. Its exploitation required no user interaction beyond a standard dependency installation.…

VMWare ESXi Vulnerabilities Exploited, Patch Now

Broadcom has published a report on the discovery of three critical vulnerabilities in their recently acquired VMWare ESXi product lineup.…

Frauds Promote Trading Scam With AI Bots in YouTube Ads

Attackers use AI-generated videos featuring credible crypto experts to create YouTube videos promoting trading scam and the deployment of smart…

Signal Linked Devices Abused by Russian Intelligence

A new fraudulent campaign to hijack Signal accounts has been detected. Attackers trick victims into scanning a QR code, authorizing…

Ivanti EPM RCE vulnerability fixed, patch now

RCE Vulnerability in Ivanti Endpoint Manager Uncovered, Patch Now

In the latest update release, Ivanti disclosed the selection of…

Hacker Uploads Data Leaked in MOVEit Breaches

Hacker Leaks Corporate Data Stolen in 2023 MOVEit Breaches

The hacker, known as Nam3L3ss, posted the data of over…

BBVA Bank Hacked, Data Posted on the Darknet Forum

Hacker Leaks BBVA Bank Data, Including User Details

On November 11, 2024 a hacker known as Gatito_FBI_NZ published…

"Verify you are human" scam website explained

Verify you are Human Scam

While browsing the Web, you can occasionally get to a…

Palo Alto Network Expedition Tool Exploited

Palo Alto Network Expedition Tool Exploited, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an…

Exploiting AI for Voice-Based Scams

GPT-4o Used for Scams and Voice Phishing

Voice-based scams grow increasingly sophisticated with the integration of advanced…

Is UC Browser credible and safe?

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find…

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions,…

Hacker Leaks Nokia Data after the Contractor Hack

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes…

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into…

Spectre Flaw Still Haunts Intel and AMD Chips, Putting Security at Risk

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability…

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website…

AI Assistant

Hello! 👋 How can I help you today?