The Security Blog From Gridinsoft

Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger

Signal Linked Devices Abused by Russian Intelligence

A new fraudulent campaign to hijack Signal accounts has been detected. Attackers trick victims into scanning a QR code, authorizing…

StaryDobry Malware Hides in Pirated Games, Deploys XMRig

A major malware campaign named StaryDobry infected gamers by distributing trojanized versions of popular games like Garry’s Mod, BeamNG.drive, and…

Fake CAPTCHA Abuses PDF and SEO Poisoning

Cybercrime actors misuse search ads to distribute fraudulent PDF files, that lead to fake CAPTCHA sites. This can end up…

Zimbra Security Updates Fix a Critical SQL Injection Vulnerability

Zimbra has released updates that fix vulnerabilities in its products. One of the vulnerabilities is critical, at a CVSS rating…

Fake Google Chrome Downloading Sites Distribute ValleyRAT

Cybercriminals have set up fake websites mimicking Google Chrome’s official download page to distribute the ValleyRAT malware. The campaign is…

Palo Alto Network Expedition Tool Exploited

Palo Alto Network Expedition Tool Exploited, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an…

Exploiting AI for Voice-Based Scams

GPT-4o Used for Scams and Voice Phishing

Voice-based scams grow increasingly sophisticated with the integration of advanced…

Is UC Browser credible and safe?

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find…

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions,…

Hacker Leaks Nokia Data after the Contractor Hack

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes…

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into…

Spectre Flaw Still Haunts Intel and AMD Chips, Putting Security at Risk

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability…

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website…

New Fortinet Flaw Is Exploited, Install Updates Now

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild.…

Hot Topic Hacked, Data of 350 Million Customers Leaked

Hot Topic Data Breach Exposes of 350 Million Customers

Data breach of a known US retailer Hot Topic leaks…

Hackers Target ex-USSR Countries with Roundcube Webmail Vulnerability

Roundcube Webmail Vulnerability Exploited in Real-World Attacks

Vulnerability in Roundcube Webmail service appears to be exploited in…

UltraAV and UltraVPN: Kaspersky Antivirus Rebranding, Are they Safe?

Kaspersky Returns with UltraAV and UltraVPN: Are They Safe?

Kaspersky, an infamous Russian antivirus brand, is now back on…

AI Assistant

Hello! 👋 How can I help you today?