The Security Blog From Gridinsoft

YouTube Videos Promoting Malware

YouTube Videos Promote Software Cracks With Lumma Stealer

Researchers have discovered a cybersecurity threat that targets users through YouTube videos. These videos offer pirated software but are being…

Two Adobe ColdFusion Vulnerabilities Exploited in The Wild

Two vulnerabilities in Adobe ColdFusion are exploited in real-world attacks, the Cybersecurity & Infrastructure Security Agency (CISA) warns. Both issues…

Tortilla (Babuk) Ransomware Decryptor Available

On January 9, 2024, Avast and Cisco Talos announced the release of a free decryptor for one of the Babuk…

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered by Prisma threat actor. This exploit leverages undocumented functionalities within…

xDedic Marketplace Members Detained In International Operations

The infamous xDedic Marketplace, known for its illicit trade in compromised computers and personal data, has been effectively dismantled. 19…

Cyberspies use USB devices

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets…

older versions of OpenSSL

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure…

Invisible Challenge in TikTok Became a Place to Spread Malware

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge became yet another host for threat actors.…

Ragnar Locker ransomware

Ragnar Locker Ransomware Accidentally Attacked Belgian Police

The operators of the ransomware Ragnar Locker published on their…

WhatsApp hacked with exposure of 500 million users' data

WhatsApp Hacked, Almost 500 Million Users Exposed

On November 28, 2022, information regarding a new WhatsApp breach…

the most common passwords

“Password” Topped the List of the Most Common Passwords in 2022

The NordPass password manager team has prepared annual statistics by…

Fake MSI Afterburner

Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

According to cybersecurity specialists from Cyble, attackers distribute miners and…

Chrome extension VenomSoftX

Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency

A Windows malware designed to steal cryptocurrency and clipboard contents…

Exploit for ProxyNotShell vulnerabilities

Exploit for Vulnerabilities ProxyNotShell Appeared on the Network

Experts warned that an exploit for two high-profile vulnerabilities in…

Zeppelin ransomware victims

Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years

Since 2020, some information security specialists have helped victims, as…

Zeppelin ransomware cipher was hacked and used by Unit221b to help victims

Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years

Security professionals at Unit221b found vulnerabilities in the Zeppelin ransomware…

Mirai botnet RapperBot

Mirai Botnet RapperBot Conducts DDoS Attacks on Game Servers

The researchers warned that the RapperBot Mirai botnet has resumed…

AI Assistant

Hello! 👋 How can I help you today?