The Security Blog From Gridinsoft

NCA Reveals Identities of REvil tops, LockBit Affiliates Arrests

Evil Corp, LockBit Ransomware Members Arrested, Structure Revealed

Recent UK NCA publications uncover the identities of 16 cybercrime actors that belong to Evil Corp/REvil and LockBit ransomware groups.…

Multiple Vulnerabilities in Linux CUPS Discovered, Allows for RCE

In a recent release, the developers of Linux printing system CUPS disclosed fixing a selection of vulnerabilities. When successfully exploited,…

Lumma Stealer Targets Transportation Companies

Hackers appear targeting logistics and transportation companies in North America with Lumma Stealer. A phishing campaign utilized various info-stealers and…

Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked…

Temu Allegedly Hacked, Data Put on Sale On The Darknet

Chinese retailer Temu allegedly suffered a huge data breach. Hackers have put a leaked database for sale on the Darknet,…

Critical Mastodon Vulnerability Leads to Account Takeover

Mastodon Vulnerability Allows for Account Takeover

A security vulnerability loophole discovered by cybersecurity experts has revealed…

Mispadu Stealer Exploits Windows SmartScreen Flaw, Targets LATAM

Mispadu Banking Trojan Exploits SmartScreen Flaw

Recent research uncovers a new sample of Mispadu malware that…

Claro Company Reports Being Hacked by Trigona Ransomware

Claro Company Hit by Trigona Ransomware

Claro Company, the largest telecom operator in Central and South…

FritzFrog Botnet Exploits Log4Shell Vulnerability

New FritzFrog Botnet Sample Exploits Log4Shell and PwnKit

Researchers detected a new sample of FritzFrog malware, that is…

Critical Apple Operating Systems Vulnerabilities Exploited

Critical Vulnerability Uncovered in Apple iOS and macOS Exploited

The Cybersecurity and Infrastructure Security Agency has identified a security…

White Phoenix Decryptor Gets an Online Version

White Phoenix Decryptor by CyberArk Updated With Web Interface

CyberArk has released an online version of a file decryptor.…

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch…

Juniper Network's Junos OS Vulnerabilities Revealed

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release…

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security…

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable…

Critical Auth Bypass Vulnerability in GoAnywhere MFT

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an…

RCE Vulnerability in Confluence Exploited in the Wild

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in…

AI Assistant

Hello! 👋 How can I help you today?