The Security Blog From Gridinsoft

Bahamut Group Exploit Phony Android Application

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack users in the South Asian region. The malware is designed…

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which has compromised at least 63 organizations since March 2023, mostly…

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact…

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Attackers targeted financial institutions, booking sites, and instant…

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) in the Ubuntu OverlayFS module. These vulnerabilities…

Vulnerability in Apple iCloud

Vulnerability in Apple iCloud puts billion users at risk

Security of over a billion iPhone owners and users of…

cyberattacks against ransomware

US Cyber ​​Command confirms cyberattacks against ransomware

The United States Cyber Command has publicly recognized the use…

web skimmer on Sealand website

Hackers introduced a web skimmer on the site of the Sealand Principality

The Record reported that unknown hackers attacked the site of…

Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device…

members of the hacker group Phoenix

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of…

published an exploit for Windows

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Bleeping Computer reported that cybersecurity researcher has published an exploit…

smartphones to find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

A team of researchers from the National University of Singapore…

exploits as a service on the darknet

Researchers noticed that the darknet is discussing exploits as a service

Analysts at Digital Shadows have prepared a report on the…

Rowhammer attack on DDR4 memory

New Rowhammer Attack Breaks DDR4 Memory Protection

Researchers have unveiled a new fuzzing attack technique, Blacksmith, which…

FBI mail server

Hackers broke into FBI mail server and sent fake cyberattack alerts

Last weekend, unknown hackers managed to break into the mail…

Clop exploits a vulnerability in SolarWinds

Clop ransomware exploits vulnerability in SolarWinds Serv-U

The NCC Group warns of a spike of Clop ransomware…

AI Assistant

Hello! 👋 How can I help you today?