The Security Blog From Gridinsoft

BeyondTrust Critical Flaw Actively Exploited, CISA Warns

BeyondTrust Remote Access Vulnerability Exploited, Update Now

BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities…

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to…

Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware

Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo’s file transfer software – Cleo Harmony, VLTrader, and LexiCom – which…

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information.…

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. This security…

Critical Ivanti CSA Authentication Bypass (CVE-2024-11639) Patched Alongside Other Severe Flaws

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass…

Veeam’s Critical RCE Vulnerability Patch Discovered

Veeam’s Critical RCE Vulnerability Patch for Service Provider Console

Veeam has released security updates to address a critical flaw,…

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

SpyLoan Virus Found in Loan Apps on Google Play Store

Experts reported the discovery of a new set of 15…

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

INTERPOL Reports Finishing Huge Anti-Financial Crime Operation

A recent international law enforcement initiative has resulted in the…

Mikhail Pavlovich Matveev a.k.a Wazawaka allegedly arrested in Kaliningrad

Wazawaka Hacker Arrested in Kaliningrad, Russia

Russian authorities have arrested the infamous hacker Mikhail Pavlovich Matveev,…

Bootkit named Bootkitty discovered in the wild, targeting Linux OS

Bootkitty Bootkit Discovered in the Wild, Targeting Linux

Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI…

Scammers Use Corrupted Word Documents In Phishing Attacks

Corrupted Word Documents Phishing Attacks Avoid Security Checks

Hackers found a new way of bypassing the email security…

CISA Alerts About Critical Vulnerability Under Active Exploitation

CISA Urges to Patch Critical Array Networks Vulnerabilities

The US cybersecurity agency CISA warned about the ongoing exploitation…

Meta Removes 2 Million Scam Accounts

Meta Deletes 2 Million Accounts Related to Scams

Meta has intensified its fight against pig butchering scams, removing…

Researchers Found New NodeStealer Samples, Based on Python

NodeStealer Returns With Python Codebase, More Functions

Researchers have identified an updated version of NodeStealer, now rewritten…

What is email phishing scams from Meta Security?

Meta Security Email Phishing Scams Explained

Attackers are targeting users of Meta services with phishing attacks.…

GitLab Releases Security Update, Patches Authentication Bypass Flaw

GitLab Fixes Critical Kubernetes Agent Takeover Vulnerability

GitLab has released another update that fixes varying degrees of…