The Security Blog From Gridinsoft

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in their PAN-OS, that leads to command injection. Residing in their…

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a range of websites with .gov, .mil, and edu. They commonly…

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of its TVs. These vulnerabilities were found back in 2023, and…

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware family that appeared on April 5, 2024. This malware aims…

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have been detected in its Pixel smartphones. The patch is already…

Microsoft Crypto Wallet Scam Spreads Luca Stealer

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

With the ever-increasing number of cyber threats, hackers and cybersecurity…

pirated software and HotRat

Trojan HotRat Is Distributed through Pirated Versions of Software and Games

Avast experts have warned that a new variant of AsyncRAT…

Malvertising spreading Gozi and IcedID Trojans

Gozi and IcedID Trojans Spread via Malvertising

Malvertising on Google Search is an unpleasant occurrence where malicious…

WooCommerce Payments WordPress Plugin

Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites

Hackers use a vulnerability in the widely used WooCommerce Payments…

AI Scam Gallops in Facebook Ads

Fake Ads on Facebook Promote Scam AI Services

Facebook has been hit by a wave of fake ads…

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8, an infamous group of cybercriminals, has updated its backdoor…

Citrix and Adobe Patch 0-day Vulnerabilities

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix was able to patch a zero-day vulnerability, while Adobe…

njRAT Hides in Trojanized TeamViewer Installers

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware.…

Military and Intelligence Data Leak On VirusTotal

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a…

Hackers Employ WormGPT for Generating Phishing Emails

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in…

US Military Emails Compromised Due to the Typos in Receiver Address

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up…

Microsoft’s nOAuth Flaw Allows Email Spoofing

Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing

In June, researchers revealed a vulnerability in Azure Active Directory…

AI Assistant

Hello! 👋 How can I help you today?