The Security Blog From Gridinsoft

Hackers Exploit Windows SmartScreen Vulnerability to Spread Phemedrone Stealer

Windows SmartScreen Vulnerability Exploited to Spread Phemedrone Stealer

The malicious campaign exploits the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to spread Phemedrone Stealer. It utilizes intricate evasion…

Cisco Unity Connection Vulnerability Enables Root Access

Cisco has recently addressed a significant security vulnerabilit in its Unity Connection softwarey, identified as CVE-2024-20272. This flaw poses a…

Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild

Ivanti issued an alert about its Connect Secure VPN appliances. Advanced threat actors are exploiting two zero-day vulnerabilities in cyberattacks,…

Water Curupira Hackers Spread PikaBot in Email Spam

Notorious group known as Water Curupira has unleashed a new wave of threats through their sophisticated malware, Pikabot. This menacing…

NoaBot Botnet: The Latest Mirai Offspring

A new botnet called NoaBot emerged in early 2023. It reportedly targets SSH servers for cryptocurrency mining using the Mirai…

SmartScreen Vulnerability Allows to Bypass Security Checks

New Microsoft SmartScreen Bypass Technique Causes Concerns

Microsoft SmartScreen proved to be an effective way of approving…

damage from cyberattacks in 2022

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI’s Internet Fraud Complaint Center (IC3) has released its…

North Korean hackers

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their…

Silicon Valley Bank Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers,…

Emotet has resumed activity

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and…

Acronis Breach Exposes Internal Company Data

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery…

vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…

Bing chatbot scammer

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded…

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach…

BlackLotus UEFI Bootkit

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is…

What is Beep Malware?

New stealthy “Beep” malware focuses heavily on evading detection

Cybercriminals periodically develop something new. Sometimes it is an updated…

AI Assistant

Hello! 👋 How can I help you today?