The Security Blog From Gridinsoft

New Chrome 0-day Vulnerability Exploited, Patch Available

New Google Chrome 0-day Vulnerability Exploited, Update Now

In the most recent release notes, Google reports about a new 0-day vulnerability that is already exploited in the wild.…

Novice FBot Stealer Targets Cloud Services

Researchers report about a new malware strain dubbed FBot. This Python-based malicious program appears to be a unique tool in…

AzorUlt Stealer Is Back In Action, Uses Email Phishing

Cybersecurity experts have stumbled upon the eight-year-old Azorult malware. This malware steals information and collects sensitive data, and has been…

Remcos RAT Targets South Korean Users Through Webhards

An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users…

GitLab Zero-Click Account Hijack Vulnerability Revealed

On January 11, 2024, GitLab released an update with the official warning regarding the critical security violation fix. The vulnerability…

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active…

AI VALL-E from Microsoft

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for…

Hackers bypass CAPTCHA

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for…

Slack repositories on GitHub

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year,…

Windows 7 ESU Cancelled

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the…

to eavesdrop on Android devices

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed…

Hackers use Excel add-ins

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel…

Hackers abuse Google Ads

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads…

Hackers stole data from LastPass

Hackers Stole Data from the LastPass Use Password Vault

LastPass password manager developers have reported that hackers who recently…

Worm Raspberry Robin

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection…

Windows 10 malicious installers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from…

GoTrim botnet hacks WordPress

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in…

AI Assistant

Hello! 👋 How can I help you today?