The Security Blog From Gridinsoft

ColdFusion Vulnerability Exploited to Infiltrate Servers of a Federal Agency

Federal Agency Hacked With ColdFusion Vulnerability

A vulnerability in Adobe’s ColdFusion allowed hackers to breach two public-facing servers at a federal agency. The Cybersecurity and Infrastructure…

Sierra AirLink Vulnerabilities Expose Critical Infrastructure

The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote…

Cactus Ransomware Attacks – Microsoft Alerts

Microsoft has raised the alarm about a growing wave of ransomware attacks utilizing malvertising tactics to spread Cactus ransomware. The…

23andMe Data Leak Exposes Nearly 7 Million Users’ Sensitive Data

Nearly 7 million clients of a genetic testing and biotechnology company 23andMe fell victim to a data leak in October.…

Outlook Vulnerability Exploited by Russian Hackers

A vulnerability in Microsoft Outlook is under active exploitation – that is the worrying notification from Microsoft. World largest software…

STOP DJVU Ransomware

Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer

An infamous STOP/Djvu ransomware adopted a new spreading tactic. According…

Raspberry Robin and Evil Corp

Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the…

DSIRF linked to Knotweed

The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

Microsoft has been told that the Knotweed hack group is…

similarities between LockBit and BlackMatter

Experts Find Similarities Between LockBit and BlackMatter

Cybersecurity researchers have confirmed similarities between the latest iteration of…

0-day vulnerabilities in PrestaShop

Stores Are under Attack due to 0-Day Vulnerability in PrestaShop

Hackers exploit a 0-day vulnerability in the open-source e-commerce platform…

Luca Stealer

Luca Stealer Source Code Published In The Darknet

Luca Stealer, an omni-purpose stealing malware programmed on Rust, was…

Linux malware Lightning Framework

New Linux Malware Lightning Framework Installs Backdoors and Rootkits

Intezer analysts call the new Linux malware Lightning Framework a…

0-day vulnerability in Chrome

Chrome 0-day Vulnerability Used to Attack Candiru Malware

Avast has discovered that DevilsTongue spyware, created by Israeli company…

Candiru Malware Uses 0-day Vulnerability In Chrome

Candiru Malware Uses 0-day Vulnerability In Chrome

Following Microsoft, Google and Citizen Lab, another revelation came from…

Malicious Campaign through Google Search

Fraudsters Are Running a Malicious Advertising Campaign through Google Search

Malwarebytes, an information security company, has discovered a large malicious…

Fake app for DDoS attacks

Fake DDoS App Targets Pro-Ukrainian Hacktivists

Google Threat Analysis Group (TAG) specialists reported that the Russian-speaking…

CloudMensis Malware for macOS

CloudMensis Malware Attacks MacOS Users

ESET experts have discovered the CloudMensis malware, which is used…

AI Assistant

Hello! 👋 How can I help you today?