The rapid growth and increasing complexity of Python based web applications and systems have made robust security testing more important than ever. Cybercriminals are constantly evolving their tactics, looking for vulnerabilities they can exploit to steal data or disrupt operations. Static Application Security Testing (SAST) is a security methodology that analyzes an application’s source code […]| NO Complexity
Python’s popularity and accessibility make it an attractive target for malicious actors. Its widespread presence on developer and server machines means attackers often find it readily available for misuse. A key security risk is Python’s ability to easily execute arbitrary code provided as data, which is a common mechanism in various injection and remote code […]| NO Complexity
Recently I noticed an new interesting announcement from Google Deepmind called: “Introducing CodeMender: an AI agent for code security“. Since I am into security this article caught my attention. A growing trend in the security tooling space is the emergence of AI-powered code auditors — tools that don’t just find vulnerabilities, but claim to fix […]| NO Complexity
The rapid growth and increasing complexity of Python based web applications and systems have made robust security testing more important than ever.| NO Complexity
We are now just a little over a month away from a significant event, the end of support for Windows 10. The official date is October 14, 2025, and for many who have relied on this operating system for years, it’s a critical deadline to address. This isn’t about rushing anyone into a decision. Instead,Continue reading "The Final Countdown for Windows 10 End of Life"| Encryption Consulting
A single tool, suite or framework to manage all aspects for security aspects is in practice impossible. There are far too many aspects that require specialist tools and expertise that creating and maintaining such a tool is impossible. Also the code-base will be insecure by design, since security maintenance of large complex code bases is in practice impossible. | NO Complexity
Good measurements for cyber security do not have to be technical. From a defence in depth principle it is recommended to have a mix of various technical and non technical measurements. A healthy distrust in security means never trust software and hardware and take as many measurements to mitigate cyber risks to acceptable levels. | NO Complexity
Instagram users targeted by crypto scam using 60+ domains. Victims shown fake balances, then asked for "verification fees". Full investigation.| Gridinsoft Blogs
Python is for one of the most used programming language to date. Especially in the AI/ML world ecosystem, most tools are based on Python programs. Large and small businesses use and trust Python to run their business. Python is from security perspective a safe choice. However even when using Python the risk on security issues […]| NO Complexity
What happened with blockchain technology is also happening with AI technology. Too many people believe that it is a solution for all hard and complex problems. I still love this flowchart that helps you to determine if blockchain is an appropriate technology for your use case. Spoiler: Blockchain is seldom a solution.| NO Complexity
Too many Python programs use assert statements to check for conditions, even in widely used modules like Pydantic. Using assert can be problematic from a security perspective. The Python assert statement itself isn’t insecure, but its misuse can lead to vulnerabilities. Rationale When using `Python -O` the Python interpreter removes all assert statements from the […]| NO Complexity
Python is for one of the most used programming language to date. Especially in the AI/ML world and the cyber security world, most tools are based on Python programs. Large and small businesses use and trust Python to run their business. However even when using Python the risk on security issues is never zero. Static application security testing (SAST) tools , like Python Codeaudit program should be used to prevent security risks or to be aware of potential risks that comes with running the s...| NO Complexity
In a significant blow to the global cybercrime ecosystem, Ukrainian authorities have arrested the suspected administrator of XSS.IS, one of the world’s most notorious and sophisticated cybercrime platforms, resulting in the forum’s complete seizure by international law enforcement. The arrest took place on July 22, 2025, with assistance from Europol and French cybercrime investigators, marking […] The post Major Cybercrime Forum XSS.IS Seized After Admin Arrested in Ukraine appeared fir...| Gridinsoft Blog
Imagine a world where hackers don’t painstakingly craft malicious code by hand, but instead train AI models to evolve and outsmart antivirus software like living organisms. This isn’t science fiction—it’s the chilling reality unveiled in a groundbreaking proof-of-concept (PoC) by Kyle Avery, Principal Offensive Specialist Lead at Outflank . Set to be presented at Black […] The post AI-Generated Malware Bypasses Microsoft Defender 8% of the Time, Black Hat 2025 Research Reveals appea...| Gridinsoft Blog
Dire Wolf ransomware surfaced in late May 2025 as another player in the increasingly crowded ransomware landscape. What sets this threat apart isn’t revolutionary technology, but rather its methodical approach to double extortion and global targeting strategy. Security researchers have tracked Dire Wolf attacks across multiple continents, affecting organizations from small businesses to larger enterprises. […] The post Dire Wolf (.direwolf) Ransomware Virus – Removal and Decryption appe...| Gridinsoft Blog
When you see a website promising free Fortnite V-Bucks, you’re looking at a carefully crafted trap. These sites can’t actually generate V-Bucks—that’s technically impossible—but they’re extremely good at stealing your account information, infecting your device with malware, and collecting personal data they can sell to other criminals. Analysis of domains like 750ge.com, Ggfn.us (you can […] The post Fortnite V-Bucks Generator Scam: Why ‘Free V-Bucks’ Sites Are Dangerous app...| Gridinsoft Blog
On the Technical Dutch Open Source Event 2025 (t-dose), I gave a talk on ‘Simplifying Security’| NO Complexity
A new vulnerability in Redis leads to potential Denial of Service with over 23,000 companies exposed to attacks| Gridinsoft Blogs
AV-Comparatives has conducted a new comprehensive evaluation of 37 cybersecurity solutions to assess their effectiveness in detecting fake webshops, a| AV-Comparatives
Threat actors use fake copyright infringement emails to lure victims into launching Lumma Stealer or Rhadamantys malware| Gridinsoft Blogs
Spectre vulnerability is still present in the newest AMD and Intel processors, according to a recent research, and can cause data leaks| Gridinsoft Blogs