The Security Blog From Gridinsoft

Phobos Ransomware Mimics VX-Underground

Phobos Ransomware Mimics VX-Underground Researchers

A new version of Phobos ransomware claims to be developed by VX-Underground, a malware info sharing community. Hackers again disguise…

Welltok Data Breach Exposes More Than 8 million Patients

Welltok, a healthcare Software as a Service (SaaS) provider, has reported unauthorized access to its MOVEit Transfer server, impacting the…

LitterDrifter – Russia’s USB Worm Targeting Ukrainian Entities

LitterDrifter USB worm, intricately linked to the notorious Gamaredon group and originating from Russia. It has set its sights on…

Apache ActiveMQ Vulnerability Exploited In The Wild

Recent Apache ActiveMQ vulnerability, that allows for remote code execution, is reportedly exploited in real-world attacks. Analysts noticed several exploitation…

Zimbra Vulnerability Exploited in the Wild

Google TAG’s recent discovery reveals a 0-day exploit, CVE-2023-37580, targeting Zimbra Collaboration. This is a Cross-Site Scripting (XSS) vulnerability exploited…

Russian hackers use Follina

Russian Hackers Use Follina Vulnerability to Attack Users in Ukraine

The Ukraine Computer Emergency Response Team (CERT-UA) said Russian hackers…

Meta Housing Ads Lawsuit

Meta to Give up its Discriminating Ad-Targeting System

Meta Cooperates Facing Chargers of Digital Discrimination A historic legal…

DFSCoerce PoC exploit

New DFSCoerce PoC Exploit Allows Attackers to Take Over Windows Domains

The recently published DFSCoerce PoC exploit uses the MS-DFSNM file…

Capital One Bank logo on the wall

A Former Amazon Employee Charged for Digital Fraud. Sentencing in September

Paige Thompson Faces up to 20 Years for Wire Fraud…

Cisco Logo

Cisco Won’t Fix an RCE Vulnerability in Old RV Routers

A 9.8/10 RCE Vulnerability in Old Cisco RV Routers Will…

Vulnerability in Windows RDP

Microsoft Has Already Patched a Vulnerability in Windows RDP Twice

This week, CyberArk researchers shared technical information about a named…

Ransomware

QNAP Warns Clients About DeadBolt Ransomware Attacks

DeadBolt Ransomware: Another Instance of Ransomware Evolution On June 17,…

backdoor stylized image

SYMBIOTE Backdoor and Rootkit Dropper Revealed

Symbiote Backdoor: a Stealthy and Highly Evasive Linux Malware Researchers…

Internet Explorer shutdown. The Epithaf

Internet Explorer shutdown. The Epithaf

On June 15, Microsoft will finally end support for Internet…

Cybercriminals' life under arrest. How does it go?

Team Xecuter’s life. How hackers leave after the arrest?

Gary Bowser, the Nintendo hacker, appears to be a very…

Ransom Extortion

Companies Manage to Bargain With Ransomware Racketeers

Revelations of the Ransom-Negotiator In May, the racketeer-bargaining specialist (the…

DOJ

The US Department of Justice Reports a Russian Botnet Dismantled

RSOCKS Russian Botnet Is No More as a Result of…

AI Assistant

Hello! 👋 How can I help you today?