The Security Blog From Gridinsoft

Aiocpa PyPI Package Targets Crypto Wallets

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information.…

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. This security…

Veeam’s Critical RCE Vulnerability Patch for Service Provider Console

Veeam has released security updates to address a critical flaw, CVE-2024-42448, with a CVSS score of 9.9. This flaw impacts…

SpyLoan Virus Found in Loan Apps on Google Play Store

Experts reported the discovery of a new set of 15 malicious mobile apps in the Google Play store that contain…

INTERPOL Reports Finishing Huge Anti-Financial Crime Operation

A recent international law enforcement initiative has resulted in the arrest of over 5,500 individuals linked to financial crimes. This…

Microsoft Fixed Several Critical Flaws in June Patch Tuesday

Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited

Microsoft has released its monthly security update, addressing 142 vulnerabilities…

AsyncRAT Mimics eBook Files to Spread

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that…

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the…

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote…

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud…

GrimResource Attack Targets Microsoft Management Console

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered,…

Binance Smart Contracts Abused in Malware Delivery

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2,…

Kaspersky Antivirus Banned By the Biden Administration

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete…

Win.MxResIcn.Heur.Gen False Positive Detection by MaxSecure

Win.MxResIcn.Heur.Gen

Antivirus engine of MaxSecure, a well-known cybersecurity vendor, currently shows…

Lumma Stealer Spreads in Fake Browser Updates Generated With ClearFake Framework

Lumma Stealer Spreads Via Fake Browser Updates, Uses ClearFake

Recent research uncovered a selection of websites that deploy Lumma…

MSMQ RCE Vulnerability Fixed in Patch Tuesday, Update Now

Microsoft Patches Critical MSMQ Vulnerability

In the latest Patch Tuesday, on June 11, 2024 Microsoft…

Hamster Kombat Rises Questions Because of Russian Registration

Hamster Kombat Game Rises Concern Over Russian Origins

Hamster Kombat, a recently released tap game in Telegram Messenger,…

AI Assistant

Hello! 👋 How can I help you today?