The Security Blog From Gridinsoft

Remcos RAT Uses Webhards to Target Korean Users

Remcos RAT Targets South Korean Users Through Webhards

An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users…

GitLab Zero-Click Account Hijack Vulnerability Revealed

On January 11, 2024, GitLab released an update with the official warning regarding the critical security violation fix. The vulnerability…

Windows SmartScreen Vulnerability Exploited to Spread Phemedrone Stealer

The malicious campaign exploits the CVE-2023-36025 vulnerability in Microsoft Windows Defender SmartScreen to spread Phemedrone Stealer. It utilizes intricate evasion…

Cisco Unity Connection Vulnerability Enables Root Access

Cisco has recently addressed a significant security vulnerabilit in its Unity Connection softwarey, identified as CVE-2024-20272. This flaw poses a…

Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild

Ivanti issued an alert about its Connect Secure VPN appliances. Advanced threat actors are exploiting two zero-day vulnerabilities in cyberattacks,…

Malware on GitHub Codespaces

Attackers Can Use GitHub Codespaces to Host and Deliver Malware

Trend Micro reports that the GitHub Codespaces cloud development environment,…

Malvertising in Google Search ads - What is That?

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements…

access to OpenAI ChatGPT

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are…

Goose Goose Duck

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

The free social detective Goose Goose Duck, which recently broke…

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active…

AI VALL-E from Microsoft

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for…

Hackers bypass CAPTCHA

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for…

Slack repositories on GitHub

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year,…

Windows 7 ESU Cancelled

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the…

to eavesdrop on Android devices

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed…

Hackers use Excel add-ins

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel…

Hackers abuse Google Ads

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads…

AI Assistant

Hello! 👋 How can I help you today?