The Security Blog From Gridinsoft

Adobe Commerce Vulnerability is Under Massive Exploitation

Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now

A research with Darknet monitoring utilities uncovered an active exploitation of a flaw present in Adobe Commerce (previously known as…

FakeUpdate Campaign Spreads WarmCookie Virus in France

FakeUpdate, a campaign of fake browser updates that pops up during regular Internet browsing, now targets users from France. The…

NC Quick Pass Toll SMS Scam Targets North Carolina

NC Quick Pass text messages is a new wave of SMS scam that targets people from North Carolina. It pretends…

Evil Corp, LockBit Ransomware Members Arrested, Structure Revealed

Recent UK NCA publications uncover the identities of 16 cybercrime actors that belong to Evil Corp/REvil and LockBit ransomware groups.…

Multiple Vulnerabilities in Linux CUPS Discovered, Allows for RCE

In a recent release, the developers of Linux printing system CUPS disclosed fixing a selection of vulnerabilities. When successfully exploited,…

SMTP Smuggling - Global Email Security Threat

SMTP Smuggling is a New Threat to Email Security

A new SMTP Smuggling technique reportedly has the potential to…

Mandiant's Account in X Hacked

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been…

RCE Vulnerability In Qualcomm Chips Exposes Millions

Qualcomm RCE Vulnerabilities Expose Millions of Users

Vulnerability in several Qualcomm chipsets allows for remote code execution…

SRLabs Releases Free Black Basta Ransomware Decryptor

Black Basta Ransomware Free Decryptor Available

SRLabs researchers published a free decryptor for BlackBasta ransomware. They…

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

In the intricate landscape of cybersecurity, comprehending the various forms…

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant…

MSIX Installer Protocol Exploited

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to…

Rugmi Loader Surfaces, Spreads Infostealers

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader.…

Xamalicious Trojan Infects Android Devices Through Google Play Apps

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the…

Integris Health Patient Complain About Extortion Emails

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim…

Carbanak is Back With New Distribution Channels

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has…

Crypto Drainer Attack - How do They Work?

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies,…

AI Assistant

Hello! 👋 How can I help you today?