The Security Blog From Gridinsoft

Hackers abuse GitHub and GitLab CDNs to Spread Malware

GitHub and GitLab CDNs Abused to Spread Malware

Recent research around new spreading approaches of one stealer malware family revealed a new way to abuse GitHub. Instead of…

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that allow attackers to exploit Kubernetes workloads for crypto…

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted in April 2024. Upon detecting the suspicious activity, the organization…

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing personal information from victims worldwide. This service specialized in creating…

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a new campaign of attackers targeting mass account compromise. Specialists have…

Phishing Dangers of .zip Domains

Are .zip Domains Safe to Use and Visit?

The Internet has become our second home. Every time we…

Phishing on Twitter Transition to X

Twitter Blue to X Phishing Breakout

Amid the chaos of Twitter’s transition to the new name…

Bahamut Group Exploit Phony Android Application

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack…

Ex-Conti Members Work for Akira Ransomware Gang

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which…

New Ivanti EPMM 0-day Vulnerability

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and…

Predasus Malware Targets Users in Latin America

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google…

OverlayFS Vulnerability Sets Up Ubuntu Users

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation…

FraudGPT Founds Application in Phishing Emails

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots.…

Google creates a red team

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will…

Social Media Threaten Information Security

Information Security Threats in Social Media

Social media has become an important aspect of our everyday…

Ivanti EPMM 0-day Vulnerability

Ivanti 0-day exploited to target Norwegian government

Software development company Ivanti (formerly MobileIron Core) has patched a…

AI Assistant

Hello! 👋 How can I help you today?