The Security Blog From Gridinsoft

BeyondTrust Critical Flaw Actively Exploited, CISA Warns

BeyondTrust Remote Access Vulnerability Exploited, Update Now

BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities…

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to…

Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware

Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo’s file transfer software – Cleo Harmony, VLTrader, and LexiCom – which…

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information.…

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. This security…

Rite Aid has reported a data breach

Rite Aid Hacked, Data of 2.2 Million Customers Leaked

In June 2024, Rite Aid, a US-based chain of pharmacy…

BadPack Android Malware Avoids Detection via Header Malformation

BadPack Malware for Android Parasites on APK Installers

A new research reveals a novel approach at hiding malware…

AT&T Hacked, 90 Million Customers Affected in Data Leak

AT&T Hacked in April, All Wireless Customers Affected

AT&T, one of the US biggest network operators, confirms a…

Microsoft Fixed Several Critical Flaws in June Patch Tuesday

Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited

Microsoft has released its monthly security update, addressing 142 vulnerabilities…

AsyncRAT Mimics eBook Files to Spread

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that…

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the…

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote…

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud…

GrimResource Attack Targets Microsoft Management Console

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered,…

Binance Smart Contracts Abused in Malware Delivery

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2,…

Kaspersky Antivirus Banned By the Biden Administration

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete…

Win.MxResIcn.Heur.Gen False Positive Detection by MaxSecure

Win.MxResIcn.Heur.Gen

Antivirus engine of MaxSecure, a well-known cybersecurity vendor, currently shows…

AI Assistant

Hello! 👋 How can I help you today?