{"id":6438,"date":"2021-12-03T16:46:55","date_gmt":"2021-12-03T16:46:55","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?page_id=6438"},"modified":"2023-04-12T15:39:27","modified_gmt":"2023-04-12T15:39:27","slug":"security-news","status":"publish","type":"page","link":"https:\/\/gridinsoft.com\/blogs\/security-news\/","title":{"rendered":"Security News"},"content":{"rendered":"<div  class=\"wp-block-ultimate-post-heading ultp-block-37e5c3\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-heading-wrap ultp-heading-style9 ultp-heading-left\"><h1 class=\"ultp-heading-inner\"><span>The Security Blog From Gridinsoft<\/span><\/h1><\/div><\/div><\/div>\r\n\r\n<div  class=\"ultp-post-grid-block wp-block-ultimate-post-post-module-2 ultp-block-2a7cfb\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-loading\"><div class=\"ultp-loading-spinner\" style=\"width:100%;height:100%\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div><div class=\"ultp-block-items-wrap ultp-block-post-module2 ultp-block-content-top ultp-block-content-false ultp-layout1\"><div class=\"ultp-big-post-module2\"><div class=\"ultp-block-item post-id-31495\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/upgrade-email-security-audit-by-gridinsoft\/\"><img decoding=\"async\" alt=\"Email Checker Released\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2026\/01\/email-check.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/upgrade-email-security-audit-by-gridinsoft\/\">Beyond Validation: Announcing the Gridinsoft Email Security Checker Upgrade<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>In an era where phishing attacks are becoming increasingly sophisticated, simply knowing if an email address exists is no longer&hellip;<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"ultp-small-post-module2\"><div class=\"ultp-block-item post-id-31458\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/kimwolf-botnet-android-tv-ddos\/\">KimWolf Botnet Hijacks 1.8M Android TVs for Massive DDoS Attacks<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>If your cheap Android TV box feels slower than usual, it might be busy launching DDoS attacks for someone else.&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31447\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/ai-image-tools-generate-realistic-fake-ids\/\">AI-Generated Fake IDs Are Getting Real &#8211; How to Detect and Defend<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Fraud teams have been passing around the same kind of screenshot lately: a passport-style fake ID produced by an AI&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31418\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/chrome-zero-day-angle-exploit-december-2025\/\">Google Patches Chrome Zero-Day Under Active Attack \u2014 Update Now<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Google dropped an urgent Chrome update on Wednesday to fix a high-severity vulnerability that&#8217;s already being exploited in the wild.&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31409\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/amos-stealer-ai-poisoning-chatgpt-grok\/\">AI Chats Are Delivering AMOS Stealer Through Google Search Results<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Here&#8217;s a novel malware delivery vector that nobody saw coming. Attackers are weaponizing publicly shared conversations with AI assistants like&hellip;<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"pagination-block-html\" aria-hidden=\"true\" style=\"display: none;\"><\/div><\/div><\/div>\r\n\r\n<div  class=\"ultp-post-grid-block wp-block-ultimate-post-post-grid-1 ultp-block-1db0af\"><div class=\"ultp-block-wrapper\"><div class=\"ultp-loading\"><div class=\"ultp-loading-spinner\" style=\"width:100%;height:100%\"><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><div><\/div><\/div><\/div><div class=\"ultp-heading-filter\"><div class=\"ultp-heading-filter-in\"><div class=\"ultp-filter-navigation\"><\/div><\/div><\/div><div class=\"ultp-block-items-wrap ultp-block-row ultp-pg1a-style1 ultp-grid1-responsive ultp-block-column-3 ultp-sm-column-2 ultp-xs-column-1 ultp-layout1\"><div class=\"ultp-block-item post-id-31409\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/amos-stealer-ai-poisoning-chatgpt-grok\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"AMOS Stealer Spreads via Poisoned AI Chats\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/GS-BLOG-AMOS-Stealer-Spreads-via-Poisoned-ChatGPT-and-Grok-AI-Chats-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/amos-stealer-ai-poisoning-chatgpt-grok\/\">AI Chats Are Delivering AMOS Stealer Through Google Search Results<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Here&#8217;s a novel malware delivery vector that nobody saw coming.&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31402\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/the-hunter-becomes-the-hunted-north-korean-hacker-infected-by-lummac2-exposing-bybit-heist-secrets\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"THE HUNTER BECOMES THE HUNTED\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/THE-HUNTER-BECOMES-THE-HUNTED-GSBLOG-870x570.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/the-hunter-becomes-the-hunted-north-korean-hacker-infected-by-lummac2-exposing-bybit-heist-secrets\/\">The Hunter Becomes the Hunted: North Korean Hacker Infected by LummaC2, Exposing Bybit Heist Secrets<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>In a twist of irony that cybersecurity researchers dream about,&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31392\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/react2shell-exploitation-china-apt\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"react2shell exploitation china apt\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/react2shell-exploitation-china-apt-870x570.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/react2shell-exploitation-china-apt\/\">React2Shell Exploitation Goes Live: Chinese APT Groups Strike<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Predictably, the exploits are rolling in. Within hours of CVE-2025-55182&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31386\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/react2shell-cve-2025-55182-rce\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"A hot December for React and Next.js\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/A-hot-December-for-React-and-Next.js-870x570.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/react2shell-cve-2025-55182-rce\/\">React2Shell: Hot December for React and Next.js as Critical 10.0 CVSS Vulnerability Hits RSC<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>CVE-2025-55182 dropped yesterday evening, and predictably, everyone&#8217;s losing their minds.&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31377\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/smarttube-compromise-malware-alert\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"SmartTube was Hacked\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/SmartTube-was-Hacked-870x570.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/smarttube-compromise-malware-alert\/\">SmartTube YouTube Client Hacked: Your Ad-Free TV App Just Became a Botnet<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Using SmartTube on your Android TV to escape YouTube&#8217;s aggressive&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31365\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/cryptomixer-takedown-operation-olympia\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"Operation Olympia: Cryptomixer down after 9 years\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/12\/Operation-Olympia-Cryptomixer-down-after-9-years-870x570.jpg\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/cryptomixer-takedown-operation-olympia\/\">Cryptomixer&#8217;s \u20ac1.3 Billion Laundromat Just Got Washed Out (With Cinematic Flair)<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Somewhere in Zurich last week, law enforcement seized Cryptomixer, a&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31343\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/blox-scam-free-robux-flood-roblox-chats\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"When Free Robux Promises Flood Roblox Game Chats\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/GS-BLOG-Blox-Scam-When-Free-Robux-Promises-Flood-Roblox-Game-ChatsBlox-Scam-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/blox-scam-free-robux-flood-roblox-chats\/\">Roblox Warning: Blox Green\/Blue\/Pink Free Robux Generators Are Fake<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>If you&#8217;ve been playing Roblox lately and noticed a sudden&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31332\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/media-land-hosting-sanctions-by-usa-uk-australia\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"Russia&#039;s &quot;Bulletproof&quot; Hosting Empire\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/GS-BLOG-Media-Land-Sanctioned-US-UK-and-Australia-Crush-Russian-Bulletproof-Hosting-Empire-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/media-land-hosting-sanctions-by-usa-uk-australia\/\">Media Land Sanctioned: US, UK, and Australia Crush Russian &#8220;Bulletproof&#8221; Hosting Empire<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>November 20, 2025 \u2014 In a rare display of international&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31321\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/claude-ai-cyber-espionage\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"Automated Espionage - Chinese Hackers\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/GS-Blog-Automated-Espionage-Chinese-Hackers-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/claude-ai-cyber-espionage\/\">Chinese Hackers Used Claude AI to Automate 90% of Cyber Espionage Campaign<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Chinese cyber spies automated 90% of their attack campaign using&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31315\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/clickfix-finger-protocol\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"ClickFix Resurrects\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/GS-BlogClickFix-Resurrects-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/clickfix-finger-protocol\/\">ClickFix Gets Creative: Abusing a 1971 Protocol to Deliver Malware<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>ClickFix is so widespread these days that you can find&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31307\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/clickfix-evolution-2025\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"ClickFix - Inside the CAPTCHA-Fueled Scam of 2025\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/GS-Blog-The-Chronicles-of-ClickFix-Inside-the-CAPTCHA-Fueled-Scam-of-2025-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/clickfix-evolution-2025\/\">The Chronicles of ClickFix: 2025&#8217;s Biggest Hit Keeps Evolving<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Meet ClickFix, the social engineering attack that&#8217;s become the cybercriminal&#8217;s&hellip;<\/p>\n<\/div><\/div><\/div><\/div><div class=\"ultp-block-item post-id-31295\"><div class=\"ultp-block-content-wrap\"><div class=\"ultp-block-image ultp-block-image-zoomIn\"><a href=\"https:\/\/gridinsoft.com\/blogs\/promptflux-ai-malware-threat\/\"><img decoding=\"async\" class=\"ultp-block-image-content\" alt=\"PROMPTFLUX AI Malware\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2025\/11\/gs-blog-PROMPTFLUX-Google-Discovers-AI-Malware-Using-Gemini-API-870x570.webp\" title=\"\"><\/a><\/div><div class=\"ultp-block-content\"><h3 class=\"ultp-block-title \"><a href=\"https:\/\/gridinsoft.com\/blogs\/promptflux-ai-malware-threat\/\">PROMPTFLUX: AI Malware Using Gemini for Self-Modification<\/a><\/h3><div class=\"ultp-block-excerpt\"><p>Malware that rewrites itself on the fly, like a shape-shifting&hellip;<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"ultp-pagination-wrap ultp-pagination-ajax-action\" data-paged=\"1\" data-expost=\"\"  data-blockid=\"1db0af\" data-postid=\"6438\" data-pages=\"104\" data-blockname=\"ultimate-post_post-grid-1\" data-selfpostid=\"no\"><ul class=\"ultp-pagination\"><li class=\"ultp-prev-page-numbers\" style=\"display:none\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n  <path stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"1.5\" d=\"m15 18-6-6 6-6\"\/>\n<\/svg>\n Previous<\/a><\/li><li class=\"ultp-first-pages\" style=\"display:none\" data-current=\"1\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/\">1<\/a><\/li><li class=\"ultp-first-dot\"style=\"display:none\"><a href=\"#\">&#8230;<\/a><\/li><li class=\"ultp-center-item pagination-active\" data-current=\"1\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/\">1<\/a><\/li><li class=\"ultp-center-item\" data-current=\"2\" ><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/page\/2\/\">2<\/a><\/li><li class=\"ultp-center-item\" data-current=\"3\" ><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/page\/3\/\">3<\/a><\/li><li class=\"ultp-last-dot\" ><a href=\"#\">&#8230;<\/a><\/li><li class=\"ultp-last-pages\" data-current=\"104\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/page\/104\/\">104<\/a><\/li><li class=\"ultp-next-page-numbers\"><a href=\"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/page\/2\/\">Next<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\">\n  <path stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"1.5\" d=\"m9 18 6-6-6-6\"\/>\n<\/svg>\n<\/a><\/li><\/ul><\/div><\/div><div class=\"pagination-block-html\" aria-hidden=\"true\" style=\"display: none;\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"ultp_page_template","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"class_list":["post-6438","page","type-page","status-publish"],"featured_image_src":null,"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=6438"}],"version-history":[{"count":26,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/revisions"}],"predecessor-version":[{"id":13749,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/pages\/6438\/revisions\/13749"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=6438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}