The Security Blog From Gridinsoft

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security software. This chain of flaws abuses legitimate drivers to disable…

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kasseika…

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an auth bypass flaw in Fortra’s GoAnywhere MFT. Rated at CVSS…

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in outdated Atlassian Confluence servers. The flaw allows attackers to execute…

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks to fix three vulnerabilities related to Citrix NetScaler and Google…

SmartScreen Vulnerability Allows to Bypass Security Checks

New Microsoft SmartScreen Bypass Technique Causes Concerns

Microsoft SmartScreen proved to be an effective way of approving…

damage from cyberattacks in 2022

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI’s Internet Fraud Complaint Center (IC3) has released its…

North Korean hackers

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their…

Silicon Valley Bank Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers,…

Emotet has resumed activity

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and…

Acronis Breach Exposes Internal Company Data

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery…

vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…

Bing chatbot scammer

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded…

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach…

BlackLotus UEFI Bootkit

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is…

What is Beep Malware?

New stealthy “Beep” malware focuses heavily on evading detection

Cybercriminals periodically develop something new. Sometimes it is an updated…

LastPass Breach Is Bigger Than It Was Expected

LastPass Breach Investigation Goes On, Things are Even Worse

LastPass, owned by GoTo (formerly LogMeIn) and with over 30…

AI Assistant

Hello! 👋 How can I help you today?