The Security Blog From Gridinsoft

What is email phishing scams from Meta Security?

Meta Security Email Phishing Scams Explained

Attackers are targeting users of Meta services with phishing attacks. Classic fraud schemes are gaining momentum once again, with users…

GitLab Fixes Critical Kubernetes Agent Takeover Vulnerability

GitLab has released another update that fixes varying degrees of vulnerabilities. Users are advised to apply the updates as soon…

FakeBat Loader is Back With New Tactics and Payload

After a brief decline in loader-based malvertising, the FakeBat loader has re-emerged as a notable threat. This loader delivers follow-up…

RCE Vulnerability in Ivanti Endpoint Manager Uncovered, Patch Now

In the latest update release, Ivanti disclosed the selection of critical vulnerabilities in their Endpoint Manager software. Among the fixed…

Hacker Leaks Corporate Data Stolen in 2023 MOVEit Breaches

The hacker, known as Nam3L3ss, posted the data of over 1000 corporations, leaked in 2023 during the active exploitation of…

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted…

Police Operation Halts LabHost Phishing Service

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing…

Сisco Talos warn of a massive attack

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a…

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in…

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a…

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of…

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware…

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have…

Flowmon Critical Vulnerability Threatens Network Infrastructure

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to…

XZ Utils Backdoor Allows for Unauthorized SSH Access

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data…

Cyberattack Results Into a Massive Data Leak From UnitedHealth

UnitedHealth Hack Leaks 6 TB of User Data

UnitedHealth Group, one of the largest providers of health insurance…

RCE Vulnerability in Microsoft SharePoint Exploited, CISA Notifies

Microsoft SharePoint Vulnerability Exploited, Update Now

In late March 2024, the U.S. Cybersecurity and Infrastructure Security…

AI Assistant

Hello! 👋 How can I help you today?