The Security Blog From Gridinsoft

Critical Boot Loader Vulnerability in Shim Puts Linux Systems in Danger

Shim Bootloader Vulnerability Affects Linux Systems

Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute…

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs.…

Third Ivanti VPN Vulnerability Under Massive Exploitation

Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue…

Docker API Vulnerability Exploited in Cryptojacking Campaign

A new campaign named “Commando Cat” uses a Docker API vulnerability. It uses Docker to gain initial access to a…

Hewlett Packard Enterprise Hacked, Darknet Forum Sales Data

On February 1, 2024, a post on a Darknet hacker forum selling Hewlett Packard Enterprise data appeared. Threat actor known…

Cloud Mining Scams Spread Roamer, the Android banking trojan

Cloud Mining Scams Spread Banking Trojans

It’s no secret that cybercriminals are increasingly using mobile platforms…

Russian-speaking Enlisted players

WannaCry 3.0 Ransomware Aims At Enlisted Russian-speaking Players

A previously unknown payload of ransomware, that call itself WannaCry…

Fake security company is spreading malware through GitHub

Malware in GitHub Repositories Is Spread From Fake Security Company Name

Researchers detected fake company accounts on GitHub linked to a…

BreachForums Back Online, Revived by ShinyHunters

BreachForums Is Back Online, Led by ShinyHunters

BreachForums, an infamous Darknet forum that was shut down in…

new vulnerabilities in MOVEit Transfer

New critical vulnerabilities found in MOVEit Transfer

It became known that during the audit in the solution…

RDP Honeypot Counted for 3.5 Million Attacks

RDP Honeypot Was Attacked 3.5 Million Times

With increased remote work, IT teams use remote access tools…

PoC Exploit for a vulnerability in Win32k

Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

Information security experts have published a PoC exploit for a…

Batcloak obfuscation engine

BatCloak’s New Obfuscation Engine Outperforms 80% of Antiviruses

Trend Micro researchers reported recently that since September 2022, attackers…

Fortinet Fixes RCE Vulnerability in Two Software Solutions

Fortinet Fixes RCE Flaws in FortiOS and FortiProxy

Fortinet, a well-known vendor of corporate-grade security solutions, issued an…

Clop and MOVEit Transfer

Clop Attacks on MOVEit Transfer Affected British Airways, BBC and More

According to security researchers, the Clop ransomware group has been…

Android Malware Hides in Play Store as Legit Apps

Android Malware Mimics VPN, Netflix and Over 60k of Other Apps

Android is an open operating system. This is an advantage…

Beware Email Scams Related to Summer Vacations

Beware of Vacation-Related Scams: 4 Most Prevalent Types

Email scam actors constantly try to pick a better disguise…