The Security Blog From Gridinsoft

1Password Vulnerability Let Attackers Exfiltrate Vault Items

1Password Vulnerability for MacOS Causes Credentials Leak

A critical vulnerability was discovered in 1Password that allows attackers to steal vault items by bypassing the app’s security measures.…

Windows COM Vulnerability Exploited by Chinese Hackers

A vulnerability in Windows COM, first discovered in 2018, has become the target of attacks once again. A Chinese hacker…

Apache OFBiz RCE Vulnerability Discovered, Patch Now

A vulnerability, CVE-2024-38856, has been discovered in Apache OFBiz that allows unauthenticated remote code execution. A patch is currently available,…

Ubiquiti G4 Vulnerability Discovered, Allowing for DDoS Attacks

Researchers found a flaw in Ubiquiti G4 Wi-Fi cameras, that exposes the selection of important chunks of information. They suppose…

Eriakos Scam in Facebook Ads Targets Personal and Banking Data

Fraudsters are using fake websites and Facebook Ads to steal users’ financial data. Researchers named the campaign Eriakos after the…

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

In the intricate landscape of cybersecurity, comprehending the various forms…

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant…

MSIX Installer Protocol Exploited

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to…

Rugmi Loader Surfaces, Spreads Infostealers

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader.…

Xamalicious Trojan Infects Android Devices Through Google Play Apps

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the…

Integris Health Patient Complain About Extortion Emails

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim…

Carbanak is Back With New Distribution Channels

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has…

Crypto Drainer Attack - How do They Work?

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies,…

Russian Hackers Target Ukraine with LonePage Malware

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor…

APT33 targets defense firms with FalseFont malware

FalseFont Malware Targets Defence Contractors Worldwide

The Iranian hacking group APT33 has developed a new malware…

Frauds Exploit Twitter's Feature to Promote Cryptoscams

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications,…

What Are Remote Encryption Attacks?

What are Remote Encryption Attacks? Explanation & Mitigation

The digital world is seeing a surge in remote encryption…

AI Assistant

Hello! 👋 How can I help you today?