The Security Blog From Gridinsoft

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website reporting a massive success in their recent anti-cybercrime activity, following…

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild. Although the attackers did not deploy malware, they managed to…

Hot Topic Data Breach Exposes of 350 Million Customers

Data breach of a known US retailer Hot Topic leaks a selection of personally identifiable information of 350 million chain’s…

Roundcube Webmail Vulnerability Exploited in Real-World Attacks

Vulnerability in Roundcube Webmail service appears to be exploited in real-world attacks. The flaw that falls under designation of stored…

Kaspersky Returns with UltraAV and UltraVPN: Are They Safe?

Kaspersky, an infamous Russian antivirus brand, is now back on the US market with its off-branded software, UltraAV antivirus and…

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted…

Police Operation Halts LabHost Phishing Service

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing…

Сisco Talos warn of a massive attack

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a…

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in…

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a…

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of…

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware…

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have…

Flowmon Critical Vulnerability Threatens Network Infrastructure

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to…

XZ Utils Backdoor Allows for Unauthorized SSH Access

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data…

Cyberattack Results Into a Massive Data Leak From UnitedHealth

UnitedHealth Hack Leaks 6 TB of User Data

UnitedHealth Group, one of the largest providers of health insurance…

RCE Vulnerability in Microsoft SharePoint Exploited, CISA Notifies

Microsoft SharePoint Vulnerability Exploited, Update Now

In late March 2024, the U.S. Cybersecurity and Infrastructure Security…

AI Assistant

Hello! 👋 How can I help you today?