The Security Blog From Gridinsoft

HijackLoader Malware Comes With Sophisticated Evasion Tactics

HijackLoader Malware Comes With New Evasion Methods

The HijackLoader malware has added new defense evasion techniques. Other threat actors are increasingly using the malware to deliver payloads…

New Fortinet VPN RCE Flaw Discovered, Patch ASAP

Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be…

Shim Bootloader Vulnerability Affects Linux Systems

Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute…

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs.…

Third Ivanti VPN Vulnerability Under Massive Exploitation

Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue…

LOBSHOT Cryptostealer Offers Advanced Capabilities

LOBSHOT malware steals cryptowallets, exploits Google Ads

LOBSHOT, a recently-detected malware family, appears to be a new…

Microsoft Edge and Bing

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept…

Clop LockBit and PaperCut

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware…

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to…

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can…

supply chain attack 3CX

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX…

Capita Hacked by Black Basta Ransomware Gang

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked…

Medusa, Bing and Cortana

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen…

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group…

Legion hacker tool

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is…

LockBit Released its Ransomware for macOS

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat…

Domino Uses Parts of Lizar Malware, Delivered by Dave Loader

Domino Backdoor is Lead by FIN7 and Conti Actors

A new Domino Backdoor popped out at the beginning of…

AI Assistant

Hello! 👋 How can I help you today?