The Security Blog From Gridinsoft

regreSSHion Vulnerability Allows Remote Attackers to Gain Root Privileges on Glibc-Based Linux

RegreSSHion OpenSSH Vulnerability Allows for RCE

A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote attackers to gain root privileges on Linux systems based on…

Fake Instagram Hacking Services

Instagram hacking scams is an old-new direction of online fraud that targets people who want to get into someone’s accounts…

New GrimResource Attack Technique Targets MMC, DLL Flaw

A new malicious code execution technique, coined GrimResource, was discovered, targeting Microsoft Management Console. Attackers are exploiting an old cross-site…

Binance Smart Contracts Blockchain Abused in Malware Spreading

Cybercriminals appear to exploit Binance smart contracts as intermediary C2, preferring them over more classic hostings for them being impossible…

Kaspersky Antivirus Banned By the Biden Administration

On June 20, 2024, the Biden administration implemented a complete ban on sales of Kaspersky software. The company has been…

Citrix and Adobe Patch 0-day Vulnerabilities

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix was able to patch a zero-day vulnerability, while Adobe…

njRAT Hides in Trojanized TeamViewer Installers

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware.…

Military and Intelligence Data Leak On VirusTotal

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a…

Hackers Employ WormGPT for Generating Phishing Emails

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in…

US Military Emails Compromised Due to the Typos in Receiver Address

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up…

Microsoft’s nOAuth Flaw Allows Email Spoofing

Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing

In June, researchers revealed a vulnerability in Azure Active Directory…

American Airlines Hacked by Cl0p via MOVEit MFT Vulnerabilities

American Airlines Hacked by Cl0P Gang, MOVEit Involved

American Airlines, the major airline company in the US, appears…

Trojan:Win32/Randet.A!plock Microsoft Defender Detection

Trojan:Win32/Randet.A!plock – What is That Detection?

Windows Defender’s mass detections of Trojan:Win32/Randet.A!plock worries people. Are the…

CVE-2023-36884 Microsoft Zero Day Vulnerability

Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild

On July 11, 2023, Microsoft published an article about addressing…

BlackLotus UEFI Bootkit

Researchers Found BlackLotus UEFI Bootkit Sources on GitHub

The source code for the BlackLotus UEFI bootkit, which was…

Cryptocurrency Scams Aim Hot and Cold Wallets At Once

Hot and Cold Crypto Wallets Hacking

Cryptocurrency is a rapidly changing world where people can make…

Fake Driver Signatures Used to Inject Malware

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a…

AI Assistant

Hello! 👋 How can I help you today?