The Security Blog From Gridinsoft

Zimbra vulnerability exploited in the wild

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting Zimbra Collaboration. This is a Cross-Site Scripting (XSS) vulnerability exploited…

ALPHV/BlackCat Ransomware Reports MeridianLink Hack To SEC

Ransomware Gang ALPHV Takes Unprecedented Step: Files SEC Complaint Over Alleged Victim’s Undisclosed Breach. And no, this is not a…

VMWare Cloud Director Vulnerability Circumvents Authentication

VMware, a key player in virtualization services, is reaching out to users about a critical security issue in its Cloud…

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and apprehended its operator. The operation took place back in September,…

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on the Darknet. The hacker says they have stolen the personal…

DFSCoerce PoC exploit

New DFSCoerce PoC Exploit Allows Attackers to Take Over Windows Domains

The recently published DFSCoerce PoC exploit uses the MS-DFSNM file…

Capital One Bank logo on the wall

A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

Paige Thompson Faces up to 20 Years for Wire Fraud…

Cisco Logo

Cisco Won’t Fix an RCE Vulnerability in Old RV Routers

A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will…

Vulnerability in Windows RDP

Microsoft Has Already Patched a Vulnerability in Windows RDP Twice

This week, CyberArk researchers shared technical information about a named…

Ransomware

QNAP Warns Clients About DeadBolt Ransomware Attacks

DeadBolt Ransomware: Another Instance of Ransomware Evolution On June 17,…

backdoor stylized image

SYMBIOTE Backdoor and Rootkit Dropper Revealed

Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers…

Internet Explorer shutdown. The Epithaf

Internet Explorer shutdown. The Epithaf

On June 15, Microsoft will finally end support for Internet…

Cybercriminals' life under arrest. How does it go?

Team Xecuter’s life. How hackers leave after the arrest?

Gary Bowser, the Nintendo hacker, appears to be a very…

Ransom Extortion

Companies Manage to Bargain With Ransomware Racketeers

Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the…

DOJ

The US Department of Justice Reports a Russian Botnet Dismantled

RSOCKS Russian Botnet Is No More as a Result of…

Microsoft fixes Follina vulnerability

Microsoft Fixed Follina Vulnerability and 55 Other Bugs

As part of the June Patch Tuesday, Microsoft finally fixed…

Interpol Operatives

Around 2000 People Arrested by Interpol for Internet Scams

Operation “First Light” The war on cybercrime goes on. As…

AI Assistant

Hello! 👋 How can I help you today?