The Security Blog From Gridinsoft

Online File Converter Scam Warning by FBI Denver

FBI Issues Online File Converter Malware Scam Warning

The FBI Denver Field Office has warned about a growing scam involving free online file converter tools, which appears to…

CVE-2025-24071 Windows File Explorer Spoofing Vulnerability Uncovered, Patch Now

Microsoft uncovered the information about a critical vulnerability in Windows File Explorer, CVE-2025-24071, with a CVSS score of 7.5. It…

MassJacker Malware

Cybersecurity researchers have found MassJacker, a new, previously undocumented malware. It targets a predominantly freebie-seeking audience, i.e. users of pirated…

Jaguar Land Rover Data Breach Involved Two Attacks

Jaguar Land Rover suffered a significant data breach. Two hackers are said to have exploited stolen Jira credentials, leaking sensitive…

Threat Actor Behind X DDoS Attack Revealed

The X DDoS Attack, reported on March 10, 2025, caused significant outages, affecting tens of thousands of users. Baptiste Robert,…

Hacker Uploads Data Leaked in MOVEit Breaches

Hacker Leaks Corporate Data Stolen in 2023 MOVEit Breaches

The hacker, known as Nam3L3ss, posted the data of over…

BBVA Bank Hacked, Data Posted on the Darknet Forum

Hacker Leaks BBVA Bank Data, Including User Details

On November 11, 2024 a hacker known as Gatito_FBI_NZ published…

"Verify you are human" scam website explained

Verify you are Human Scam

While browsing the Web, you can occasionally get to a…

Palo Alto Network Expedition Tool Exploited

Palo Alto Network Expedition Tool Exploited, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued an…

Exploiting AI for Voice-Based Scams

GPT-4o Used for Scams and Voice Phishing

Voice-based scams grow increasingly sophisticated with the integration of advanced…

Is UC Browser credible and safe?

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find…

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions,…

Hacker Leaks Nokia Data after the Contractor Hack

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes…

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into…

Spectre Flaw Still Haunts Intel and AMD Chips, Putting Security at Risk

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability…

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website…

New Fortinet Flaw Is Exploited, Install Updates Now

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild.…

AI Assistant

Hello! 👋 How can I help you today?