The Security Blog From Gridinsoft

New Fortinet Flaw Is Exploited, Install Updates Now

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild. Although the attackers did not deploy malware, they managed to…

Hot Topic Data Breach Exposes of 350 Million Customers

Data breach of a known US retailer Hot Topic leaks a selection of personally identifiable information of 350 million chain’s…

Roundcube Webmail Vulnerability Exploited in Real-World Attacks

Vulnerability in Roundcube Webmail service appears to be exploited in real-world attacks. The flaw that falls under designation of stored…

Kaspersky Returns with UltraAV and UltraVPN: Are They Safe?

Kaspersky, an infamous Russian antivirus brand, is now back on the US market with its off-branded software, UltraAV antivirus and…

Spring Framework Vulnerability Leads to Data Leaks, Fix Now

Spring Framework has released an update that fixes the CVE-2024-38819 vulnerability, which potentially enables attackers to exploit HTTP requests for…

Data Leaked From Hewlett Packard is For Sale on BreachForums

Hewlett Packard Enterprise Hacked, Darknet Forum Sales Data

On February 1, 2024, a post on a Darknet hacker…

Critical Mastodon Vulnerability Leads to Account Takeover

Mastodon Vulnerability Allows for Account Takeover

A security vulnerability loophole discovered by cybersecurity experts has revealed…

Mispadu Stealer Exploits Windows SmartScreen Flaw, Targets LATAM

Mispadu Banking Trojan Exploits SmartScreen Flaw

Recent research uncovers a new sample of Mispadu malware that…

Claro Company Reports Being Hacked by Trigona Ransomware

Claro Company Hit by Trigona Ransomware

Claro Company, the largest telecom operator in Central and South…

FritzFrog Botnet Exploits Log4Shell Vulnerability

New FritzFrog Botnet Sample Exploits Log4Shell and PwnKit

Researchers detected a new sample of FritzFrog malware, that is…

Critical Apple Operating Systems Vulnerabilities Exploited

Critical Vulnerability Uncovered in Apple iOS and macOS Exploited

The Cybersecurity and Infrastructure Security Agency has identified a security…

White Phoenix Decryptor Gets an Online Version

White Phoenix Decryptor by CyberArk Updated With Web Interface

CyberArk has released an online version of a file decryptor.…

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch…

Juniper Network's Junos OS Vulnerabilities Revealed

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release…

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security…

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable…

Critical Auth Bypass Vulnerability in GoAnywhere MFT

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an…

AI Assistant

Hello! 👋 How can I help you today?