The Security Blog From Gridinsoft

CISA Urges Patching Citrix RCE Vulnerability

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks to fix three vulnerabilities related to Citrix NetScaler and Google…

LockBit Ransomware Uses Resume Word Files to Spread

A recent investigation by ASEC reveals the new tactics of an infamous LockBit ransomware. “Post-paid pentesters” started masquerading as innocuous…

Over 178,000 SonicWall Firewalls are Vulnerable to DoS and RCE

Recent research uncovers a significant portion of SonicWall firewall instances being susceptible to attacks. In particular, two vulnerabilities are able…

9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II

A chain of 9 vulnerabilities in UEFI’s Preboot Execution Environment (PXE), dubbed PixieFail, was uncovered in a recent research. As…

New Google Chrome 0-day Vulnerability Exploited, Update Now

In the most recent release notes, Google reports about a new 0-day vulnerability that is already exploited in the wild.…

Slack repositories on GitHub

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year,…

Windows 7 ESU Cancelled

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the…

to eavesdrop on Android devices

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed…

Hackers use Excel add-ins

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel…

Hackers abuse Google Ads

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads…

Hackers stole data from LastPass

Hackers Stole Data from the LastPass Use Password Vault

LastPass password manager developers have reported that hackers who recently…

Worm Raspberry Robin

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection…

Windows 10 malicious installers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from…

GoTrim botnet hacks WordPress

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in…

New version of Truebot

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

Information security experts warned of an increase in the number…

Hackers stole from hackers

Hackers Stole over $2.5 million from Hackers

In the past 12 months hackers have scammed more than…

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed…

AI Assistant

Hello! 👋 How can I help you today?