The Security Blog From Gridinsoft

ColdFusion Vulnerability Exploited to Infiltrate Servers of a Federal Agency

Federal Agency Hacked With ColdFusion Vulnerability

A vulnerability in Adobe’s ColdFusion allowed hackers to breach two public-facing servers at a federal agency. The Cybersecurity and Infrastructure…

Sierra AirLink Vulnerabilities Expose Critical Infrastructure

The grand total of 21 security flaws was discovered in Sierra Wireless AirLink routers firmware. The vulnerabilities allow for remote…

Cactus Ransomware Attacks – Microsoft Alerts

Microsoft has raised the alarm about a growing wave of ransomware attacks utilizing malvertising tactics to spread Cactus ransomware. The…

23andMe Data Leak Exposes Nearly 7 Million Users’ Sensitive Data

Nearly 7 million clients of a genetic testing and biotechnology company 23andMe fell victim to a data leak in October.…

Outlook Vulnerability Exploited by Russian Hackers

A vulnerability in Microsoft Outlook is under active exploitation – that is the worrying notification from Microsoft. World largest software…

AstraLocker ransomware operators

AstraLocker Ransomware Operators Publish File Decryption Tools

AstraLocker ransomware operators have announced that the malware is ending…

0-day vulnerabilities 2022

0-Day Vulnerabilities of 2022 Repeat the Mistakes of Past Years

Google Project Zero researcher Maddie Stone published a study on…

list of 25 problems 2022

MITRE experts have published a list of the 25 most dangerous problems of 2022

MITRE experts have published a list of the 25 most…

ZuoRAT trojan hacks routers

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access…

LockBit 3.0 Builder

Hackers Launched LockBit 3.0 and Bug Bounty Ransomware

The LockBit ransomware group released the LockBit 3.0 malware, at…

LockBit 2.0 Logo

LockBit Weaponizes Its Victims’ Clients – Brett Callow

Brett Callow, a cybersecurity analyst at Emsisoft, shared information on…

Microsoft Edge WebView2

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

An information security expert known as mr.d0x has developed a…

decryptor for Lorenz ransomware

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Trend Micro, a Japanese IT security company, has published a…

Conti Ransomware Shutdown, Site Disabled

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure.…

New Way to Cheat Ransomware Victims into Opening Infected Emails

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

A new type of email-bait has been invented by the…

NCC Group Threat Pulse May

NCC Group’s May 2022 Threat Report Reflects Conti’s End

NCC Group’s monthly report on cyber threats features some curious…

CAPTCHA WINDOW

Privacy Access Tokens to Replace CAPTCHA Real Soon

CAPTCHA, a well-known test for website visitors to prove they…

AI Assistant

Hello! 👋 How can I help you today?