The Security Blog From Gridinsoft

Docker Engine Auth Bypass Vulnerability Abuses Authentication Plugins

Docker Engine Authentication Bypass Vulnerability Exploited

Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain…

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings.…

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader…

CrowdStrike Falcon Bug Causes Windows Outages Around the Globe

Bug in the recent update of the CrowdStrike Falcon caused thousands of systems across the world to crash with BSOD.…

Rite Aid Hacked, Data of 2.2 Million Customers Leaked

In June 2024, Rite Aid, a US-based chain of pharmacy stores, experienced a cyberattack. The attack affected the company’s information…

DarkGate Malware Activity Spikes as Developer Rents Out It

DarkGate Loader Expands Activity, Delivers Ransomware

A new DarkGate malware deployment campaign has caught the attention…

Qakbot Botnet Shut Down, Ransomware Attacks Stopped

Qakbot Botnet Hacked, Removed from Over 700,000 Machines

Qakbot, a notorious botnet, has been taken down by a…

Wilko Shopping Scams Hide as Stock Liquidation

Wilko Stock Liquidation Scams – Fake Shopping Sites

Recent events around the Wilko retail chain are sad for…

Botnet of 400k Devices Was Used as Proxy Service

Botnet of 400,000 Devices Used as Proxy Nodes Uncovered

Cybercriminals used stealthy malware to create a botnet of 400,000…

HiatusRAT Analysis & Recent Attack Description

HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military

Recent attacks on US military systems and Taiwan companies are…

The Season of Back to School Scams

Back to School Scams Expand As August Begins

As the new school season approaches, scammers target students and…

Patch to Ivanti EPMM Vulnerability Is Exploitable

Ivanti EPMM Vulnerability Patch is Vulnerable

Ivanti, the provider of a wide range of management solutions…

Phishing Dangers of .zip Domains

Are .zip Domains Safe to Use and Visit?

The Internet has become our second home. Every time we…

Phishing on Twitter Transition to X

Twitter Blue to X Phishing Breakout

Amid the chaos of Twitter’s transition to the new name…

Bahamut Group Exploit Phony Android Application

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack…

Ex-Conti Members Work for Akira Ransomware Gang

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which…

New Ivanti EPMM 0-day Vulnerability

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and…

AI Assistant

Hello! 👋 How can I help you today?