The Security Blog From Gridinsoft

ShadowRay Vulnerability Exploited in Real World Attacks

ShadowRay Vulnerability Threatens AI Workloads, No Patch Available

Recent review of vulnerabilities in the Ray framework uncovered the unpatched flaw, dubbed ShadowRay. It appears that hundreds of machine…

GoFetch Vulnerability in Apple Silicon Uncovered

Researchers uncovered a vulnerability in Apple Silicon processors, dubbed GoFetch. It allows attackers to extract secret keys from Mac computers…

STRRAT and Vcurms Malware Abuse GitHub for Spreading

A new phishing campaign has recently been discovered that uses GitHub to deliver Remote Access Trojans (RAT) STRRAT and Vcurms…

Fujitsu Hacked, Warns of Data Leak Possibility

Fujitsu, one of the world’s leading IT companies, reports uncovering the hack in their internal network. The company discovered malware…

Fortinet RCE Vulnerability Affects FortiClient EMS Servers

Fortinet disclosed a critical vulnerability affecting FortiClient EMS products in March 2024. This vulnerability, categorized as an SQL injection, poses…

RedLine Stealer is Off to a Low Start

RedLine Stealer Issues 100,000 Samples – What is Happening?

Throughout the entire early May 2023, GridinSoft analysts team observed…

Aurora Stealer Spreads via Fake Windows Update

Fake Windows Update in Browser Deliver Aurora Stealer

Fake Windows Update became a malware spreading way once again.…

FSB cyberspyware

The FBI Disrupted the Cyberspyware “Snake” that the Russian FSB Used for 20 Years

The US Federal Bureau of Investigation on Tuesday reported the…

LockBit Gang Leaks 600GB of Fullerton India's Data

Fullerton India Hacked, LockBit Leaks 600GB of Data

Fullerton India, a large lending institution from India, appears to…

Ransomware Using AuKill Malware to Disable EDR

Ransomware Attacks Increasingly Using AuKill Malware to Disable EDR

A new cybercrime tool called “AuKill” has emerged, which attackers…

AI and brain signals

AI Generated Video Based on Mouse Brain Signals

A team of researchers from the EPFL has developed an…

Black Cat and Western Digital

BlackCat Group Leaks Western Digital Data to the Network

The operators of the ransomware BlackCat (aka ALPHV) have published…

LOBSHOT Cryptostealer Offers Advanced Capabilities

LOBSHOT malware steals cryptowallets, exploits Google Ads

LOBSHOT, a recently-detected malware family, appears to be a new…

Microsoft Edge and Bing

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept…

Clop LockBit and PaperCut

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware…

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to…

AI Assistant

Hello! 👋 How can I help you today?