The Security Blog From Gridinsoft

CVSS 9.9 Vulnerability in Apache Traffic Control Fixed, Update ASAP

Apache Traffic Control Critical SQLi Vulnerability Fixed

Apache Traffic Control platform got a critical security patch that addresses a major vulnerability that could let attackers execute arbitrary…

Lockbit 4.0 Released, With New Infrastructure and Features

Lockbit ransomware group steps up with a new version of its malicious software, LockBit 4.0, and with adjustments to their…

LockBit Ransomware Developer Arrested and Extradicted in Israel

US authorities have detained a developer associated with the LockBit group, one of the most active ransomware creators. Investigators allege…

BeyondTrust Remote Access Vulnerability Exploited, Update Now

BeyondTrust’s Privileged Remote Access (PRA) and Remote Support (RS) solutions have two vulnerabilities, identified as CVE-2024-12356 and CVE-2024-12686. These vulnerabilities…

New Ledger Phishing Campaign Targets Recovery Phrases

Owners of popular hardware cryptocurrency wallets Ledger have become the target of phishing attacks. Hackers send out fake emails to…

Exploiting AI for Voice-Based Scams

GPT-4o Used for Scams and Voice Phishing

Voice-based scams grow increasingly sophisticated with the integration of advanced…

Is UC Browser credible and safe?

UC Browser – Is it Legit? Analysis & Verdict

While browsing the Web, you can at some point find…

Quishing: QR Code Phishing on the Rise

QR Code Phishing Scams

Scammers use the speed and simplicity of QR code interactions,…

Hacker Leaks Nokia Data after the Contractor Hack

Nokia Data Leaked, Put for Sale on the Darknet

On November 4, 2024 an infamous threat actor that goes…

Threat actors use copyright infringement phishing lure to deploy infostealers

Fake Copyright Emails Spread Lumma, Rhadamantys Stealers

Cyber attackers leverage copyright infringement claims to lure victims into…

Spectre Flaw Still Haunts Intel and AMD Chips, Putting Security at Risk

Spectre Vulnerability Keeps Haunting AMD, Intel CPUs

Researchers have demonstrated an exploit targeting the speculative execution vulnerability…

Law Enforcements Disrupt Redline, META infostealers in Operation Magnus

Operation Magnus Disrupts Infrasturcture of RedLine, META Stealers

On October 28, 2024 Dutch cyber police launched a website…

New Fortinet Flaw Is Exploited, Install Updates Now

CVE-2024-47575 Fortinet RCE Flaw Exploited in Cyberattacks

A critical vulnerability in Fortinet was exploited in the wild.…

Hot Topic Hacked, Data of 350 Million Customers Leaked

Hot Topic Data Breach Exposes of 350 Million Customers

Data breach of a known US retailer Hot Topic leaks…

Hackers Target ex-USSR Countries with Roundcube Webmail Vulnerability

Roundcube Webmail Vulnerability Exploited in Real-World Attacks

Vulnerability in Roundcube Webmail service appears to be exploited in…

UltraAV and UltraVPN: Kaspersky Antivirus Rebranding, Are they Safe?

Kaspersky Returns with UltraAV and UltraVPN: Are They Safe?

Kaspersky, an infamous Russian antivirus brand, is now back on…

Spring Framework has released an update that fixes the CVE-2024-38819 vulnerability

Spring Framework Vulnerability Leads to Data Leaks, Fix Now

Spring Framework has released an update that fixes the CVE-2024-38819…

AI Assistant

Hello! 👋 How can I help you today?