The Security Blog From Gridinsoft

OAuth2 Vulnerability Allows for Persistent Session Hijacking

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered by Prisma threat actor. This exploit leverages undocumented functionalities within…

xDedic Marketplace Members Detained In International Operations

The infamous xDedic Marketplace, known for its illicit trade in compromised computers and personal data, has been effectively dismantled. 19…

Verified X/Twitter Accounts Hacked to Spread Cryptoscams

The trend of hacking official accounts to promote cryptocurrency fraud is gaining momentum. Over the past week, researchers have discovered…

SMTP Smuggling is a New Threat to Email Security

A new SMTP Smuggling technique reportedly has the potential to bypass existing security protocols. Also it can enable attackers to…

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been hacked to promote a cryptocurrency scam. It happens along with…

older versions of OpenSSL

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure…

Invisible Challenge in TikTok Became a Place to Spread Malware

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge became yet another host for threat actors.…

Ragnar Locker ransomware

Ragnar Locker Ransomware Accidentally Attacked Belgian Police

The operators of the ransomware Ragnar Locker published on their…

WhatsApp hacked with exposure of 500 million users' data

WhatsApp Hacked, Almost 500 Million Users Exposed

On November 28, 2022, information regarding a new WhatsApp breach…

the most common passwords

“Password” Topped the List of the Most Common Passwords in 2022

The NordPass password manager team has prepared annual statistics by…

Fake MSI Afterburner

Fake MSI Afterburner Infects Users’ Machines with Miners and Stealers

According to cybersecurity specialists from Cyble, attackers distribute miners and…

Chrome extension VenomSoftX

Chrome Extension ViperSoftX Steals Passwords and Cryptocurrency

A Windows malware designed to steal cryptocurrency and clipboard contents…

Exploit for ProxyNotShell vulnerabilities

Exploit for Vulnerabilities ProxyNotShell Appeared on the Network

Experts warned that an exploit for two high-profile vulnerabilities in…

Zeppelin ransomware victims

Security Experts Secretly Helped Zeppelin Ransomware Victims for Two Years

Since 2020, some information security specialists have helped victims, as…

Zeppelin ransomware cipher was hacked and used by Unit221b to help victims

Unit221b Secretly Helped Victims of Zeppelin Ransomware for 2 Years

Security professionals at Unit221b found vulnerabilities in the Zeppelin ransomware…

Mirai botnet RapperBot

Mirai Botnet RapperBot Conducts DDoS Attacks on Game Servers

The researchers warned that the RapperBot Mirai botnet has resumed…

PCspoF and the Orion spacecraft

PCspoF Attack Could Disable Orion Spacecraft

A team of researchers from the University of Michigan, the…

AI Assistant

Hello! 👋 How can I help you today?