The Security Blog From Gridinsoft

CISA Alerts About Critical Vulnerability Under Active Exploitation

CISA Urges to Patch Critical Array Networks Vulnerabilities

The US cybersecurity agency CISA warned about the ongoing exploitation of a critical-severity flaw in Array Networks’ secure access gateway…

Meta Deletes 2 Million Accounts Related to Scams

Meta has intensified its fight against pig butchering scams, removing over 2 million accounts linked to these operations on Facebook…

NodeStealer Returns With Python Codebase, More Functions

Researchers have identified an updated version of NodeStealer, now rewritten in Python. This version is capable of extracting additional information…

Meta Security Email Phishing Scams Explained

Attackers are targeting users of Meta services with phishing attacks. Classic fraud schemes are gaining momentum once again, with users…

GitLab Fixes Critical Kubernetes Agent Takeover Vulnerability

GitLab has released another update that fixes varying degrees of vulnerabilities. Users are advised to apply the updates as soon…

Hackers abuse GitHub and GitLab CDNs to Spread Malware

GitHub and GitLab CDNs Abused to Spread Malware

Recent research around new spreading approaches of one stealer malware…

OpenMetadata Vulnerabilities Threats Kubernetes Workloads, Actively Exploited

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical…

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted…

Police Operation Halts LabHost Phishing Service

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing…

Сisco Talos warn of a massive attack

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a…

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in…

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a…

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of…

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware…

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have…

Flowmon Critical Vulnerability Threatens Network Infrastructure

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to…

XZ Utils Backdoor Allows for Unauthorized SSH Access

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data…

AI Assistant

Hello! 👋 How can I help you today?