The Security Blog From Gridinsoft

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch for a critical vulnerability. This flaw could allow unauthorized users…

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release of fixes for a selection of vulnerabilities in their Junos…

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security software. This chain of flaws abuses legitimate drivers to disable…

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kasseika…

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an auth bypass flaw in Fortra’s GoAnywhere MFT. Rated at CVSS…

Black Cat and Western Digital

BlackCat Group Leaks Western Digital Data to the Network

The operators of the ransomware BlackCat (aka ALPHV) have published…

LOBSHOT Cryptostealer Offers Advanced Capabilities

LOBSHOT malware steals cryptowallets, exploits Google Ads

LOBSHOT, a recently-detected malware family, appears to be a new…

Microsoft Edge and Bing

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept…

Clop LockBit and PaperCut

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware…

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to…

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can…

supply chain attack 3CX

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX…

Capita Hacked by Black Basta Ransomware Gang

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked…

Medusa, Bing and Cortana

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen…

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group…

Legion hacker tool

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is…

LockBit Released its Ransomware for macOS

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat…

AI Assistant

Hello! 👋 How can I help you today?