The Security Blog From Gridinsoft

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of its TVs. These vulnerabilities were found back in 2023, and…

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware family that appeared on April 5, 2024. This malware aims…

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have been detected in its Pixel smartphones. The patch is already…

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to be vulnerable to arbitrary command injection. Successful exploitation of the…

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data compression tool was discovered by Andres Freund. The maintainer of…

PindOS JavaScript Dropper

PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware

Deep Instinct specialists spoke about a new JavaScript dropper called…

Malicious USB campaign

Chinese Hackers Accidentally Infected European Hospital with Malware

Check Point analysts found that Chinese hackers in a chain…

Fake Super Mario Game Spreads Umbral Stealer

Super Mario Malware: Hackers Spread Stealers in the Fake Game

The Super Mario video game franchise has gained immense acclaim…

Reset MFA in LastPass

LastPass Users Can’t Login to App after Resetting MFA

Since May 2023, users of the LastPass password manager have…

RepoJacking and GitHub attacks

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are…

Condi malware builds a botnet

Condi Malware Builds a Botnet from TP-Link Routers

In May 2023, a new Condi malware, focused on DDoS…

ChatGPT Accounts Are Compromised by Stealer Malware

Over 100k ChatGPT Accounts Are For Sale on the Darknet

According to a new report, over the past year, over…

APT28 attacked Ukrainian organizations

APT28 Attacked Ukrainian and Polish Organizations

Recorded Future, in collaboration with CERT-UA researchers, has unveiled a…

Freaky Leaky SMS

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Researchers have created a side-channel attack called “Freaky Leaky SMS”,…

Credentials Theft & Emails Scams - How to Protect?

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and…

Keys for Windows 11 Pro

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google…

NortonLifeLock Hacked Via MOVEit Vulnerability

NortonLifeLock Hacked by Cl0P Gang, Using MOVEit Vulnerability

NortonLifeLock, the world-famous antivirus software developer, had reportedly been hacked…

AI Assistant

Hello! 👋 How can I help you today?