The Security Blog From Gridinsoft

Avast Releases Donex Ransomware Decryptor

Donex, DarkRace, fake LockBit 3.0 and Muse Ransomware Decryptor Released

A decryptor for a Donex ransomware, also known under the name of Muse, DarkRace and LockBit 3.0, has been released…

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote attackers to gain root privileges on Linux systems based on…

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud that targets people who want to get into someone’s accounts…

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered, targeting Microsoft Management Console. Attackers are exploiting an old cross-site…

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2, preferring them over more classic hostings for them being impossible…

Bahamut Group Exploit Phony Android Application

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack…

Ex-Conti Members Work for Akira Ransomware Gang

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which…

New Ivanti EPMM 0-day Vulnerability

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and…

Predasus Malware Targets Users in Latin America

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google…

OverlayFS Vulnerability Sets Up Ubuntu Users

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation…

FraudGPT Founds Application in Phishing Emails

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots.…

Google creates a red team

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will…

Ivanti EPMM 0-day Vulnerability

Ivanti 0-day exploited to target Norwegian government

Software development company Ivanti (formerly MobileIron Core) has patched a…

Microsoft Crypto Wallet Scam Spreads Luca Stealer

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

With the ever-increasing number of cyber threats, hackers and cybersecurity…

pirated software and HotRat

Trojan HotRat Is Distributed through Pirated Versions of Software and Games

Avast experts have warned that a new variant of AsyncRAT…

Malvertising spreading Gozi and IcedID Trojans

Gozi and IcedID Trojans Spread via Malvertising

Malvertising on Google Search is an unpleasant occurrence where malicious…

AI Assistant

Hello! 👋 How can I help you today?