The Security Blog From Gridinsoft

Boeing Hacked By LockBit Gang

Boeing Hack Confirmed, LockBit Group Resposible

Boeing, a major aircraft manufacturer and aerospace & defence contractor in the US, has confirmed the ransomware attack. A week…

Malicious WhatsApp Mods Spread Through Telegram

Some WhatsApp mods, which are unofficial versions of the app, have been found to contain hidden spyware. This spyware is…

New F5 BIG-IP Vulnerabilities Exploited In The Wild

Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution and SQL injection. The company explains it as…

WeChat and Kaspersky Ban in Canada – What You Should Know?

The Canadian government has instituted a ban on the use of WeChat and Kaspersky applications on government-issued mobile devices, effective…

New Confluence Vulnerability Leads to Unauthorised Access

Another vulnerability in the flagship product of Atlassian corporation, Confluence, allows hackers to access the servers and dump the data.…

Wizard Spider Group

Cybersecurity Experts Analyzed the Methods of a Group of Russian Hackers Wizard Spider

Information security specialists from PRODAFT have published the results of…

steal a Tesla car

Information Security Specialist Showed How to Steal a Tesla Car

Sultan Qasim Khan, a security consultant of the NCC Group,…

PowerShell RAT malware

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in…

Microsoft and the PetitPotam Attacks

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

In May, Microsoft released a security update, as it had…

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit attacks the Canadian defensive co. Top Aces inc

Canadian defense contractor Top Aces Inc became the victim of…

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Following recent fixes for a large number of UEFI vulnerabilities,…

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

Not a long time ago, a cybersecurity analyst posted a…

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

A vulnerability has been discovered (CVE not yet issued) in…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that…

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Analysis of more than 40 chats with victims allowed the…

Ukraine hit by DDoS attacks

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was…

mustang panda cyberspies

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

Secureworks researchers have discovered a phishing campaign by Chinese Mustang…

AI Assistant

Hello! 👋 How can I help you today?