The Security Blog From Gridinsoft

Citrix and Adobe Patch 0-day Vulnerabilities

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix was able to patch a zero-day vulnerability, while Adobe warns of attacks using ColdFusion Zero-Day and releases an urgent…

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular favourite for the final payload is the infamous…

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a file with the names, email addresses and other data of…

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing attacks, such as the new WormGPT tool. WormGPT…

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up on similarly-named Mali emails because of the domain name typo.…

hackers defaced government websites

Most likely russian hackers defaced Ukrainian government websites

Hackers defaced several Ukrainian government websites: the attack occurred on…

remote access to Tesla cars

Teen gets remote access to 25 Tesla cars

19-year-old David Colombo said on Twitter that he gets remote…

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

Aquatic Panda exploits Log4Shell

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury…

Magnat campaigns delivering fake installers

Magnat campaigns delivering fake installers

Cyber security specialists warn of the Magnat malicious distribution waves…

2easy trading platform

The 2easy trading platform is gaining popularity on the darknet

KELA analysts say that the 2easy trading platform is gaining…

another Log4j vulnerability

Another vulnerability found in Log4j, this time it is a denial of service

Log4Shell, recently discovered in the popular logging library Log4j, which…

Apache Log4j Vulnerability explained by Google

Apache Log4j Vulnerability explained by Google

On December 17th, 2021 in their blog Google Open Source…

Log4j threatens Java packages

Log4j vulnerability threatens 35,000 Java packages

Google scanned Maven Central, the largest Java repository to date,…