The Security Blog From Gridinsoft

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch for a critical vulnerability. This flaw could allow unauthorized users…

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release of fixes for a selection of vulnerabilities in their Junos…

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security software. This chain of flaws abuses legitimate drivers to disable…

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kasseika…

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an auth bypass flaw in Fortra’s GoAnywhere MFT. Rated at CVSS…

scam Pig Butchering

Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store

The Pig Butchering scam, a scam operation that specializes in…

Vulnerability in KeePass

Vulnerability in KeePass Allows Stealing All User Passwords in Plain Text

The developers of the open-source password manager KeePass explain that…

Mass outage of Microsoft services

Change in the IP Address of the Router Caused a Massive Outage of Microsoft Services

Last week, Microsoft 365 services around the world suffered a…

Microsoft will block Excel XLL

Microsoft Will Block Excel XLL Files Downloaded from the Internet

Microsoft developers are going to block some Excel add-in (.XLL)…

Ransomware Income Dropped

Ransomware Revenues Dropped by 40% because Victims Refuse to pay

Ransomware revenue (from ransomware attacks) has fallen from $765.6 million…

Malware on GitHub Codespaces

Attackers Can Use GitHub Codespaces to Host and Deliver Malware

Trend Micro reports that the GitHub Codespaces cloud development environment,…

Malvertising in Google Search ads - What is That?

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements…

access to OpenAI ChatGPT

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are…

Goose Goose Duck

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

The free social detective Goose Goose Duck, which recently broke…

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active…

AI VALL-E from Microsoft

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for…

AI Assistant

Hello! 👋 How can I help you today?