The Security Blog From Gridinsoft

Chrome Vulnerability Allows for RCE Exploitation

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Google released an urgent security update for its Chrome browser. The patch contains the fix for CVE-2023-4863, a heap buffer…

Spyware in Fake Telegram Apps Infected Over 10 million Users

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions…

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively…

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable…

NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers

On September 7, 2023, NCA released a statement regarding the new complex pack of sanctions against Russian Conti cybercrime group…

Microsoft and the PetitPotam Attacks

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

In May, Microsoft released a security update, as it had…

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit attacks the Canadian defensive co. Top Aces inc

Canadian defense contractor Top Aces Inc became the victim of…

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Following recent fixes for a large number of UEFI vulnerabilities,…

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

Not a long time ago, a cybersecurity analyst posted a…

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

A vulnerability has been discovered (CVE not yet issued) in…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that…

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Analysis of more than 40 chats with victims allowed the…

Ukraine hit by DDoS attacks

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was…

mustang panda cyberspies

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

Secureworks researchers have discovered a phishing campaign by Chinese Mustang…

Cybersecurity Threats

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than…

Vulnerabilities in Linux and superuser rights

Vulnerabilities in Linux Allow Gaining Superuser Rights

A Microsoft specialist has discovered vulnerabilities in Linux systems, the…

State Department offers reward for any information on Russian hackers

State Department Offers $1 million for Info on Russian Hackers

The US State Department has announced a reward amounting up…

AI Assistant

Hello! 👋 How can I help you today?