The Security Blog From Gridinsoft

Investment Scams on Facebook How Cybercriminals Filter and Target Victims

Investment Scams on Facebook: How Cybercriminals Filter and Target Victims

Investment scams continue to evolve in sophistication, with cybercriminals deploying increasingly complex methods to target potential victims. Recent research from…

BreachForums is Down, Admins Posted a PGP-Signed Message

BreachForums, an infamous Darknet forum, has gone offline recently, only to get back up with a worrying message on its…

$GROK Presale Scam: Crypto Investment Fraud

The $GROK Presale Scam tricks people into investing in a fake cryptocurrency by using Elon Musk’s name and his Grok…

CVE-2025-21605 Redis DoS Vulnerability Discovered, Patch Now

So Redis walks into a bar and the bartender asks, “Why so bloated?” Turns out Redis has been hitting the…

WordPress Ad-Fraud Plugins and the Scallywag Operation

Cybersecurity researchers have found a large-scale ad fraud scheme called “Scallywag”. It used WordPress plugins to generate massive fraudulent ad…

LockBit Ransomware Developer Arrested and Extradicted in Israel

LockBit Ransomware Developer Arrested and Extradicted in Israel

US authorities have detained a developer associated with the LockBit…

BeyondTrust Critical Flaw Actively Exploited, CISA Warns

BeyondTrust Remote Access Vulnerability Exploited, Update Now

BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions…

Ledger wallet owners have been targeted by attackers, again

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the…

Cleo File Transfer Vulnerabilities Are A New Ransomware Attack Vector

Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware

Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo’s file…

Aiocpa PyPI Package Targets Crypto Wallets

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python…

Critical Ivanti CSA Authentication Bypass (CVE-2024-11639) Patched Alongside Other Severe Flaws

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass…

Veeam’s Critical RCE Vulnerability Patch Discovered

Veeam’s Critical RCE Vulnerability Patch for Service Provider Console

Veeam has released security updates to address a critical flaw,…

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

SpyLoan Virus Found in Loan Apps on Google Play Store

Experts reported the discovery of a new set of 15…

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

INTERPOL Reports Finishing Huge Anti-Financial Crime Operation

A recent international law enforcement initiative has resulted in the…

Mikhail Pavlovich Matveev a.k.a Wazawaka allegedly arrested in Kaliningrad

Wazawaka Hacker Arrested in Kaliningrad, Russia

Russian authorities have arrested the infamous hacker Mikhail Pavlovich Matveev,…

Bootkit named Bootkitty discovered in the wild, targeting Linux OS

Bootkitty Bootkit Discovered in the Wild, Targeting Linux

Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI…

Scammers Use Corrupted Word Documents In Phishing Attacks

Corrupted Word Documents Phishing Attacks Avoid Security Checks

Hackers found a new way of bypassing the email security…

AI Assistant

Hello! 👋 How can I help you today?