The Security Blog From Gridinsoft

Are Top Maine Lobster Ads Real?

Top Maine Lobster Scam on Facebook

Another fraudulent scheme related to the sale of seafood has appeared on Facebook. Fraudsters promise lobster at an excellent price,…

Boeing Hack Confirmed, LockBit Group Resposible

Boeing, a major aircraft manufacturer and aerospace & defence contractor in the US, has confirmed the ransomware attack. A week…

Malicious WhatsApp Mods Spread Through Telegram

Some WhatsApp mods, which are unofficial versions of the app, have been found to contain hidden spyware. This spyware is…

New F5 BIG-IP Vulnerabilities Exploited In The Wild

Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution and SQL injection. The company explains it as…

WeChat and Kaspersky Ban in Canada – What You Should Know?

The Canadian government has instituted a ban on the use of WeChat and Kaspersky applications on government-issued mobile devices, effective…

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

Not a long time ago, a cybersecurity analyst posted a…

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

A vulnerability has been discovered (CVE not yet issued) in…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that…

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Analysis of more than 40 chats with victims allowed the…

Ukraine hit by DDoS attacks

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was…

mustang panda cyberspies

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

Secureworks researchers have discovered a phishing campaign by Chinese Mustang…

Cybersecurity Threats

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than…

Vulnerabilities in Linux and superuser rights

Vulnerabilities in Linux Allow Gaining Superuser Rights

A Microsoft specialist has discovered vulnerabilities in Linux systems, the…

State Department offers reward for any information on Russian hackers

State Department Offers $1 million for Info on Russian Hackers

The US State Department has announced a reward amounting up…

Emotet malware bug

Emotet Malware Operators Found a Bug in Their Bootloader

Emotet malware operators have fixed a bug due to which,…

T-Mobile and hack group Lapsus$

T-Mobile Admits that Lapsus$ Hack Group Stole Its Source Codes

Information security specialist Brian Krebs found out that even before…

Amazon patch for Log4Shell

Amazon Patch for Log4Shell allowed privilege escalation

Palo Alto Networks warns that a patch released by Amazon…

AI Assistant

Hello! 👋 How can I help you today?