The Security Blog From Gridinsoft

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma Stealer and Rhadamanthys malware, specifically targeting Taiwanese Facebook…

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability in the Indirect Branch Predictor Barrier (IBPB). Although the flaw,…

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following…

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild. Although the attackers did not deploy malware, they managed to…

Hot Topic Data Breach Exposes of 350 Million Customers

Data breach of a known US retailer Hot Topic leaks a selection of personally identifiable information of 350 million chain’s…

BangBros Drops 12 Million Records About Users

BangBros Leak Exposes 12 Million User Records

BangBros, a studio and platform specializing in adult content, leaked…

Fake Google Authenticator App Spreads Through Ads

Fake Google Authenticator Abuses Google Ads, Spreads Malware

Cybercriminals promote a fake Google Authenticator page through ads in…

Gh0st RAT Uses Fake Chrome Site to Attack Chinese Users

Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page

Attackers are using a new loader, Gh0stGambit, to spread Gh0st…

Cyber Threats Facing the 2024 Paris Olympics

2024 Olympic Cyberattack Risks: What Should We Expect

The Olympic Games is a massive sporting event that attracts…

India Post Smishing Scam Targets iPhone Users in India

India Post SMS Phishing Targets Mobile Users in India

Massive complaints come from Indian users regarding a new wave…

Docker Engine Auth Bypass Vulnerability Abuses Authentication Plugins

Docker Engine Authentication Bypass Vulnerability Exploited

Attackers are actively exploiting a critical vulnerability in the Docker…

Hamster Kombat Tap-Game Players Targeted in Malware Spreading

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Players of Hamster Kombat have become prime targets for scammers…

Jellyfish Loader Malware Overview

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

A new threat has been discovered in the form of…

CrowdStrike Falcon Causes Windows Machines to Crash

CrowdStrike Falcon Bug Causes Windows Outages Around the Globe

Bug in the recent update of the CrowdStrike Falcon caused…

Rite Aid has reported a data breach

Rite Aid Hacked, Data of 2.2 Million Customers Leaked

In June 2024, Rite Aid, a US-based chain of pharmacy…

BadPack Android Malware Avoids Detection via Header Malformation

BadPack Malware for Android Parasites on APK Installers

A new research reveals a novel approach at hiding malware…

AT&T Hacked, 90 Million Customers Affected in Data Leak

AT&T Hacked in April, All Wireless Customers Affected

AT&T, one of the US biggest network operators, confirms a…