The Security Blog From Gridinsoft

One More Flaw in Ivanti VPN Products

Third Ivanti VPN Vulnerability Under Massive Exploitation

Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue…

Docker API Vulnerability Exploited in Cryptojacking Campaign

A new campaign named “Commando Cat” uses a Docker API vulnerability. It uses Docker to gain initial access to a…

Hewlett Packard Enterprise Hacked, Darknet Forum Sales Data

On February 1, 2024, a post on a Darknet hacker forum selling Hewlett Packard Enterprise data appeared. Threat actor known…

Mastodon Vulnerability Allows for Account Takeover

A security vulnerability loophole discovered by cybersecurity experts has revealed that decentralized social network Mastodon contains a critical vulnerability. Also,…

Mispadu Banking Trojan Exploits SmartScreen Flaw

Recent research uncovers a new sample of Mispadu malware that uses a SmartScreen bypass flaw to integrate itself into the…

SFX can launch PowerShell

SFX Archives Can Sneakily Launch PowerShell

CrowdStrike warns that hackers are adding malicious functionality to self-extracting…

Genesis Market Is Shut Down by FBI

Genesis Market Seized by FBI

Genesis Market, a Darknet marketplace for stolen information, was reportedly…

Keygen for Windows 95 from Chatgpt

Blogger Forced ChatGPT to Generate Keys for Windows 95

YouTube user Enderman demonstrated that he was able to force…

Hack Group Winter Vivern

Russian-Speaking Hack Group Winter Vivern Attacks Governments in Europe and Asia

The Russian-speaking hack group Winter Vivern (aka TA473 in the…

What is APT43?

APT43 Funds Cybercrime With Stolen Crypto

Researchers have identified a new state-backed hacker group in North…

Aspera Faspex Breach CVE-2022-47986 Is Used To Deploy Ransomware

Ransomware Actors Target IBM’s Aspera Faspex

File transfer utility Aspera Faspex, developed by IBM, became a…

3CX Software Falls Victim To Supply Chain Attack

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication,…

CFTC Lawsuit to Binance May Cause Scam Storm

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges…

aCropalypse vulnerability for Windows

The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows

Information security experts have discovered that the aCropalypse vulnerability, which…

Fake ChatGPT Plugin is Spread Through Chrome Web Store

Malicious ChatGPT Add-On Hijack Facebook Accounts

ChatGPT became a worldwide phenomenon in recent months. GPT-4 update…

BlackGuard Stealer Extends Crypto Stealing Functionality

BlackGuard Receives Update, Targets More Cryptowallets

BlackGuard, a prolific infostealer malware, received an update at the…

Linus Tech Tips Channel Hacked, Spreads Crypto Scam

Linus Tech Tips YouTube Channel Hacked

Linus Tech Tips, a YouTube 15-million tech channel, was hacked…

AI Assistant

Hello! 👋 How can I help you today?