The Security Blog From Gridinsoft

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have been detected in its Pixel smartphones. The patch is already…

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to be vulnerable to arbitrary command injection. Successful exploitation of the…

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data compression tool was discovered by Andres Freund. The maintainer of…

UnitedHealth Hack Leaks 6 TB of User Data

UnitedHealth Group, one of the largest providers of health insurance and health care services in the United States, suffered a…

Microsoft SharePoint Vulnerability Exploited, Update Now

In late March 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued the alert regarding the exploitation of a…

Bahamut Group Exploit Phony Android Application

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack…

Ex-Conti Members Work for Akira Ransomware Gang

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which…

New Ivanti EPMM 0-day Vulnerability

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and…

Predasus Malware Targets Users in Latin America

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google…

OverlayFS Vulnerability Sets Up Ubuntu Users

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation…

FraudGPT Founds Application in Phishing Emails

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots.…

Google creates a red team

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will…

Social Media Threaten Information Security

Information Security Threats in Social Media

Social media has become an important aspect of our everyday…

Ivanti EPMM 0-day Vulnerability

Ivanti 0-day exploited to target Norwegian government

Software development company Ivanti (formerly MobileIron Core) has patched a…

Microsoft Crypto Wallet Scam Spreads Luca Stealer

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

With the ever-increasing number of cyber threats, hackers and cybersecurity…

pirated software and HotRat

Trojan HotRat Is Distributed through Pirated Versions of Software and Games

Avast experts have warned that a new variant of AsyncRAT…