The Security Blog From Gridinsoft

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote attackers to gain root privileges on Linux systems based on…

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud that targets people who want to get into someone’s accounts…

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered, targeting Microsoft Management Console. Attackers are exploiting an old cross-site…

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2, preferring them over more classic hostings for them being impossible…

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete ban on sales of Kaspersky software. The company has been…

VMware Issues Urgent Warning About Unpatched Critical Cloud Director Vulnerability

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, a key player in virtualization services, is reaching out…

IPStorm Botnet Stopped by FBI, Key Operator Detained

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and…

Plume Data Breach Published on the Darknet

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on…

Reptar Vulnerability in Intel Allows to Escalate Privileges

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors…

Moneris claimed by Medusa ransomware

Moneris Hacked, Medusa Ransomware Claims

Canadian fintech giant Moneris has been claimed to have been…

Trojanized CPU-Z Installer Promoted in Google Ads

Malicious CPU-Z Copy Is Spread In Google Search Ads

Attackers are again abusing the Google Ads platform to distribute…

Boeing data breach

LockBit Ransomware Exposes Boeing’s 50GB of Data Leaked

In a cybersecurity nightmare, Boeing, a global aerospace and defense…

SLP Vulnerability Used in DDoS attacks

SLP DDoS Amplification Vulnerability Actively Exploited

In a recent development, the U.S. Cybersecurity and Infrastructure Security…

SecuriDropper Attack Androids Devices

SecuriDropper Bypasses Google Play & Android Defenses

SecuriDropper is a rare example of the Android dropper malware…

North Korean Hackers Push New Wave of Concerns

North Korean Hackers Force US, Japan & South Korea Consultations

Increased activity by North Korean state hackers forced South Korea,…

Socks5Systemz Dropper Malware Overview

Socks5Systemz Proxy Service Infects 10,000 Systems Worldwide

A proxy botnet, “Socks5Systemz”, uses malware loaders to infiltrate computers…

Are Top Maine Lobster Ads Real?

Top Maine Lobster Scam on Facebook

Another fraudulent scheme related to the sale of seafood has…

AI Assistant

Hello! 👋 How can I help you today?