The Security Blog From Gridinsoft

Adobe ColdFusion Vulnerabilities Exploited in the Wild

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks, the Cybersecurity & Infrastructure Security Agency (CISA) warns. Both issues…

Tortilla (Babuk) Ransomware Decryptor Available

On January 9, 2024, Avast and Cisco Talos announced the release of a free decryptor for one of the Babuk…

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered by Prisma threat actor. This exploit leverages undocumented functionalities within…

xDedic Marketplace Members Detained In International Operations

The infamous xDedic Marketplace, known for its illicit trade in compromised computers and personal data, has been effectively dismantled. 19…

Verified X/Twitter Accounts Hacked to Spread Cryptoscams

The trend of hacking official accounts to promote cryptocurrency fraud is gaining momentum. Over the past week, researchers have discovered…

Windows 10 malicious installers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from…

GoTrim botnet hacks WordPress

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in…

New version of Truebot

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

Information security experts warned of an increase in the number…

Hackers stole from hackers

Hackers Stole over $2.5 million from Hackers

In the past 12 months hackers have scammed more than…

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed…

Hosting of open-source projects Fosshost

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are…

vulnerabilities in Hyundai and Genesis

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for…

FBI and CUBA ransomware

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency…

Cyberspies use USB devices

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets…

older versions of OpenSSL

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure…

Invisible Challenge in TikTok Became a Place to Spread Malware

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge became yet another host for threat actors.…

Ragnar Locker ransomware

Ragnar Locker Ransomware Accidentally Attacked Belgian Police

The operators of the ransomware Ragnar Locker published on their…

AI Assistant

Hello! 👋 How can I help you today?