The Security Blog From Gridinsoft

PindOS JavaScript Dropper

PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware

Deep Instinct specialists spoke about a new JavaScript dropper called PindOS (such a “self-name” was found in the malware code…

Chinese Hackers Accidentally Infected European Hospital with Malware

Check Point analysts found that Chinese hackers in a chain of accidents infected an unnamed European hospital with malware. Researchers…

Super Mario Malware: Hackers Spread Stealers in the Fake Game

The Super Mario video game franchise has gained immense acclaim due to its platforming gameplay, lively visuals, memorable characters. Recently,…

LastPass Users Can’t Login to App after Resetting MFA

Since May 2023, users of the LastPass password manager have been experiencing severe login issues after resetting their MFA. It…

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are vulnerable to an attack that allows taking over other people’s…

ransomware LockFile ProxyShell and PetitPotam

LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities

The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam…

2000 Exchange servers hacked

Over 2000 Exchange Servers Hacked Using ProxyShell Exploit

Researchers at Huntress Labs estimate that over the past few…

most attacked Linux vulnerabilities

Experts list 15 most attacked Linux vulnerabilities

Trend Micro has published a list of the top threats…

Razer Synapse vulnerability

Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges

A security researcher known as jonhat discovered a 0-day vulnerability…

Hacked the US Census Bureau

Attackers hacked the US Census Bureau using Citrix exploit

The Office of the Inspector General (OIG) reported that unknown…

Vulnerabilities in STARTTLS

Vulnerabilities in STARTTLS threaten popular email clients

At the USENIX conference, a group of German scientists announced…

List of suspects in terrorism

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting…

Print Spooler Vulnerability

Microsoft Warns of New Print Spooler Vulnerability

Microsoft has released a notice of a new vulnerability in…

patches for 44 Microsoft vulnerabilities

Microsoft releases patches for 44 vulnerabilities, including three 0-days

As part of Patch Tuesday this week, Microsoft released patches…

FlyTrap Android malware

FlyTrap Android malware compromised over 10,000 Facebook accounts

According to experts from Zimperium, Android malware FlyTrap hijacks Facebook…

Ukrainian fighters against pirates

Ukrainian fighters against pirates asked Google to block 127.0.0.1

The TorrentFreak media reports that Vindex, Ukrainian fighters against pirates,…