The Security Blog From Gridinsoft

Critical Boot Loader Vulnerability in Shim Puts Linux Systems in Danger

Shim Bootloader Vulnerability Affects Linux Systems

Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute…

Ov3r_Stealer Steals Crypto and Credentials, Exploits Facebook Job Ads

A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs.…

Third Ivanti VPN Vulnerability Under Massive Exploitation

Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue…

Docker API Vulnerability Exploited in Cryptojacking Campaign

A new campaign named “Commando Cat” uses a Docker API vulnerability. It uses Docker to gain initial access to a…

Hewlett Packard Enterprise Hacked, Darknet Forum Sales Data

On February 1, 2024, a post on a Darknet hacker forum selling Hewlett Packard Enterprise data appeared. Threat actor known…

Legion hacker tool

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is…

LockBit Released its Ransomware for macOS

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat…

Domino Uses Parts of Lizar Malware, Delivered by Dave Loader

Domino Backdoor is Lead by FIN7 and Conti Actors

A new Domino Backdoor popped out at the beginning of…

BlackLotus UEFI bootkit

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the…

Shadowban on twitter

Vulnerability Found in Twitter Code That Provokes a “Shadowban” of the Victim

Recently, Twitter fulfilled a promise made by Elon Musk and…

ChaosGPT was asked to destroy humanity

Strange Enthusiasts Asked ChaosGPT to Destroy Humanity and Establish World Domination

Enthusiasts launched the ChaosGPT project, based on the open-source Auto-GPT,…

MSMQ Security Flaw Allows RCE

MSMQ Vulnerability Allows Remote Code Execution

Recent update released by Microsoft, an April Patch Tuesday, revealed…

eFile tax return service

Hackers Infect eFile Tax Filing Service with Malware

The eFile service, used by many Americans to file their…

Rilide Malware Steals Data from Chromium Browsers

Rilide Malware Steals Data from Chromium Browsers

Trustwave SpiderLabs specialists spoke about the new Rilide malware, which…

Rorschach Ransomware Is Probably A New Favourite

Rorschach Ransomware Analysis

Recent research from the CheckPoint Research team revealed a new…

New ransomware Rorschach

Rorschach’s New Ransomware Is Named the Fastest to Date

Check Point analysts have discovered a new ransomware, Rorschach ransomware…

SFX can launch PowerShell

SFX Archives Can Sneakily Launch PowerShell

CrowdStrike warns that hackers are adding malicious functionality to self-extracting…

AI Assistant

Hello! 👋 How can I help you today?