The Security Blog From Gridinsoft

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions, quishing attacks have emerged as a new threat that hides…

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes by IntelBroker published a message about selling a huge piece…

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma Stealer and Rhadamanthys malware, specifically targeting Taiwanese Facebook…

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability in the Indirect Branch Predictor Barrier (IBPB). Although the flaw,…

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following…

Microsoft Fixed Several Critical Flaws in June Patch Tuesday

Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited

Microsoft has released its monthly security update, addressing 142 vulnerabilities…

AsyncRAT Mimics eBook Files to Spread

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that…

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the…

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote…

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud…

GrimResource Attack Targets Microsoft Management Console

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered,…

Binance Smart Contracts Abused in Malware Delivery

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2,…

Kaspersky Antivirus Banned By the Biden Administration

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete…

Win.MxResIcn.Heur.Gen False Positive Detection by MaxSecure

Win.MxResIcn.Heur.Gen

Antivirus engine of MaxSecure, a well-known cybersecurity vendor, currently shows…

Lumma Stealer Spreads in Fake Browser Updates Generated With ClearFake Framework

Lumma Stealer Spreads Via Fake Browser Updates, Uses ClearFake

Recent research uncovered a selection of websites that deploy Lumma…

MSMQ RCE Vulnerability Fixed in Patch Tuesday, Update Now

Microsoft Patches Critical MSMQ Vulnerability

In the latest Patch Tuesday, on June 11, 2024 Microsoft…

Hamster Kombat Rises Questions Because of Russian Registration

Hamster Kombat Game Rises Concern Over Russian Origins

Hamster Kombat, a recently released tap game in Telegram Messenger,…