The Security Blog From Gridinsoft

PyPI Malware Exploits Typosquatting, Spreads Infostealer & Crypto Hijacker

PyPI Malware Spreading Outbreak Exploits Typosquatting

PyPI, an index of Python packages, once again became a place for malware spreading. Threat actors registered hundreds of profiles…

ShadowRay Vulnerability Threatens AI Workloads, No Patch Available

Recent review of vulnerabilities in the Ray framework uncovered the unpatched flaw, dubbed ShadowRay. It appears that hundreds of machine…

GoFetch Vulnerability in Apple Silicon Uncovered

Researchers uncovered a vulnerability in Apple Silicon processors, dubbed GoFetch. It allows attackers to extract secret keys from Mac computers…

STRRAT and Vcurms Malware Abuse GitHub for Spreading

A new phishing campaign has recently been discovered that uses GitHub to deliver Remote Access Trojans (RAT) STRRAT and Vcurms…

Fujitsu Hacked, Warns of Data Leak Possibility

Fujitsu, one of the world’s leading IT companies, reports uncovering the hack in their internal network. The company discovered malware…

Malvertising spreading Gozi and IcedID Trojans

Gozi and IcedID Trojans Spread via Malvertising

Malvertising on Google Search is an unpleasant occurrence where malicious…

WooCommerce Payments WordPress Plugin

Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites

Hackers use a vulnerability in the widely used WooCommerce Payments…

AI Scam Gallops in Facebook Ads

Fake Ads on Facebook Promote Scam AI Services

Facebook has been hit by a wave of fake ads…

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8, an infamous group of cybercriminals, has updated its backdoor…

Citrix and Adobe Patch 0-day Vulnerabilities

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix was able to patch a zero-day vulnerability, while Adobe…

njRAT Hides in Trojanized TeamViewer Installers

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware.…

Military and Intelligence Data Leak On VirusTotal

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a…

Hackers Employ WormGPT for Generating Phishing Emails

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in…

US Military Emails Compromised Due to the Typos in Receiver Address

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up…

Microsoft’s nOAuth Flaw Allows Email Spoofing

Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing

In June, researchers revealed a vulnerability in Azure Active Directory…

American Airlines Hacked by Cl0p via MOVEit MFT Vulnerabilities

American Airlines Hacked by Cl0P Gang, MOVEit Involved

American Airlines, the major airline company in the US, appears…

Trojan:Win32/Randet.A!plock Microsoft Defender Detection

Trojan:Win32/Randet.A!plock – What is That Detection?

Windows Defender’s mass detections of Trojan:Win32/Randet.A!plock worries people. Are the…