The Security Blog From Gridinsoft

Ledger wallet owners have been targeted by attackers, again

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to…

Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware

Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo’s file transfer software – Cleo Harmony, VLTrader, and LexiCom – which…

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python Package Index (PyPI), engineered to steal sensitive cryptocurrency wallet information.…

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass vulnerability in its Cloud Services Appliance (CSA) solution. This security…

Veeam’s Critical RCE Vulnerability Patch for Service Provider Console

Veeam has released security updates to address a critical flaw, CVE-2024-42448, with a CVSS score of 9.9. This flaw impacts…

BadPack Android Malware Avoids Detection via Header Malformation

BadPack Malware for Android Parasites on APK Installers

A new research reveals a novel approach at hiding malware…

AT&T Hacked, 90 Million Customers Affected in Data Leak

AT&T Hacked in April, All Wireless Customers Affected

AT&T, one of the US biggest network operators, confirms a…

Microsoft Fixed Several Critical Flaws in June Patch Tuesday

Microsoft Fixes 3 Critical Vulnerabilities in July Patch Tuesday, One Exploited

Microsoft has released its monthly security update, addressing 142 vulnerabilities…

AsyncRAT Mimics eBook Files to Spread

AsyncRAT Spreads As Fake eBook Files, Uses LNK Files

Recent research uncovers a new spreading campaign of AsyncRAT, that…

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the…

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote…

Instagram Hacking Online Scams Frenzy

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud…

GrimResource Attack Targets Microsoft Management Console

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered,…

Binance Smart Contracts Abused in Malware Delivery

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2,…

Kaspersky Antivirus Banned By the Biden Administration

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete…

Win.MxResIcn.Heur.Gen False Positive Detection by MaxSecure

Win.MxResIcn.Heur.Gen

Antivirus engine of MaxSecure, a well-known cybersecurity vendor, currently shows…

Lumma Stealer Spreads in Fake Browser Updates Generated With ClearFake Framework

Lumma Stealer Spreads Via Fake Browser Updates, Uses ClearFake

Recent research uncovered a selection of websites that deploy Lumma…

AI Assistant

Hello! 👋 How can I help you today?