The Security Blog From Gridinsoft

SVG Virus: Phishing Attacks and Malware Injection Through an Image

SVG Virus: New Phishing Tactique in Images

Security researchers have discovered a phishing campaign that is based on the misuse of SVG virus images. Although there have…

Cisco Authorization Bypass Vulnerabilities Discovered

Cisco has rolled out security updates to fix two critical vulnerabilities in its Identity Services Engine (ISE). If exploited, these…

The Alarming Rise of DeepSeek Scams

The release of DeepSeek AI chatbot gave a push for an enormous number of DeepSeek scams that trick users in…

DeepSeek AI Data Leaked, Exposing User Data

Wiz Research discovered a detailed DeepSeek database containing sensitive information, including user chat history, API keys, and logs. Additionally, it…

Jupiter Airdrop Scam

Jupiter Airdrop scam is an alleged crypto-airdrop campaign that promises free crypto tokens, yet in return only empties users’ crypto…

LockBit 4.0 Ransomware Released, Launches Affiliate Hiring Campaign

Lockbit 4.0 Released, With New Infrastructure and Features

Lockbit ransomware group steps up with a new version of…

LockBit Ransomware Developer Arrested and Extradicted in Israel

LockBit Ransomware Developer Arrested and Extradicted in Israel

US authorities have detained a developer associated with the LockBit…

BeyondTrust Critical Flaw Actively Exploited, CISA Warns

BeyondTrust Remote Access Vulnerability Exploited, Update Now

BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions…

Ledger wallet owners have been targeted by attackers, again

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the…

Cleo File Transfer Vulnerabilities Are A New Ransomware Attack Vector

Cleo File Transfer Vulnerabilities Exploited by Cl0p Ransomware

Recent cybersecurity incidents have exposed critical vulnerabilities in Cleo’s file…

Aiocpa PyPI Package Targets Crypto Wallets

Aiocpa PyPI Package Targets Crypto Wallets

A malicious package named aiocpa was identified on the Python…

Critical Ivanti CSA Authentication Bypass (CVE-2024-11639) Patched Alongside Other Severe Flaws

Ivanti Fixes Authentication Bypass Vulnerability, Patch Now

Ivanti has alerted its customers to a critical authentication bypass…

Veeam’s Critical RCE Vulnerability Patch Discovered

Veeam’s Critical RCE Vulnerability Patch for Service Provider Console

Veeam has released security updates to address a critical flaw,…

8 Million Android Users Hit by SpyLoan Malware in Loan Apps on Google Play

SpyLoan Virus Found in Loan Apps on Google Play Store

Experts reported the discovery of a new set of 15…

INTERPOL Arrests 5,500 in Global Cybercrime Crackdown, Seizes Over $400 Million

INTERPOL Reports Finishing Huge Anti-Financial Crime Operation

A recent international law enforcement initiative has resulted in the…

Mikhail Pavlovich Matveev a.k.a Wazawaka allegedly arrested in Kaliningrad

Wazawaka Hacker Arrested in Kaliningrad, Russia

Russian authorities have arrested the infamous hacker Mikhail Pavlovich Matveev,…

Bootkit named Bootkitty discovered in the wild, targeting Linux OS

Bootkitty Bootkit Discovered in the Wild, Targeting Linux

Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI…

AI Assistant

Hello! 👋 How can I help you today?