The Security Blog From Gridinsoft

OpenMetadata Vulnerabilities Threats Kubernetes Workloads, Actively Exploited

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical vulnerabilities that allow attackers to exploit Kubernetes workloads for crypto…

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted in April 2024. Upon detecting the suspicious activity, the organization…

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing personal information from victims worldwide. This service specialized in creating…

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a new campaign of attackers targeting mass account compromise. Specialists have…

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in their PAN-OS, that leads to command injection. Residing in their…

new vulnerabilities in MOVEit Transfer

New critical vulnerabilities found in MOVEit Transfer

It became known that during the audit in the solution…

RDP Honeypot Counted for 3.5 Million Attacks

RDP Honeypot Was Attacked 3.5 Million Times

With increased remote work, IT teams use remote access tools…

PoC Exploit for a vulnerability in Win32k

Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

Information security experts have published a PoC exploit for a…

Batcloak obfuscation engine

BatCloak’s New Obfuscation Engine Outperforms 80% of Antiviruses

Trend Micro researchers reported recently that since September 2022, attackers…

Fortinet Fixes RCE Vulnerability in Two Software Solutions

Fortinet Fixes RCE Flaws in FortiOS and FortiProxy

Fortinet, a well-known vendor of corporate-grade security solutions, issued an…

Clop and MOVEit Transfer

Clop Attacks on MOVEit Transfer Affected British Airways, BBC and More

According to security researchers, the Clop ransomware group has been…

Android Malware Hides in Play Store as Legit Apps

Android Malware Mimics VPN, Netflix and Over 60k of Other Apps

Android is an open operating system. This is an advantage…

Beware Email Scams Related to Summer Vacations

Beware of Vacation-Related Scams: 4 Most Prevalent Types

Email scam actors constantly try to pick a better disguise…

What is BlackCat Ransomware

BlackCat Ransomware New Update Boosts Exfiltration Speed

BlackCat ransomware continues to make a fuss globally for the…

ChatGPT and malicious packages

Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages

According to vulnerability and risk management company Vulcan Cyber, attackers…

Clop and MOVEit Transfer

Microsoft Researchers Link Clop Gang to MOVEit Transfer Attack

Microsoft has linked the Clop ransomware gang to a recent…

ChatGPT is Used to Create Phishing Emails With Social Engineering

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Artificial intelligence has become an advanced tool in today’s digital…

AI Assistant

Hello! 👋 How can I help you today?