The Security Blog From Gridinsoft

Trojan:Win32/Randet.A!plock Microsoft Defender Detection

Trojan:Win32/Randet.A!plock – What is That Detection?

Windows Defender’s mass detections of Trojan:Win32/Randet.A!plock worries people. Are the user files complained about by Defender malicious? Trojan:Win32/Randet.A!plock Microsoft Defender…

Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild

On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884 vulnerability. This breach allowed for remote code execution…

Researchers Found BlackLotus UEFI Bootkit Sources on GitHub

The source code for the BlackLotus UEFI bootkit, which was previously sold on the dark web for $5,000, has been…

Hot and Cold Crypto Wallets Hacking

Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers…

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear…

malware in AMD and Nvidia

Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale

Bleeping Computer discovered that an exploit that uses the memory…

ProxyToken vulnerability in Microsoft Exchange

ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange

A dangerous vulnerability called ProxyToken has been discovered in Microsoft…

Critical vulnerability in Cosmos DB

Microsoft warned of a critical vulnerability in Cosmos DB

Microsoft has warned thousands of Azure customers of a critical…

ransomware LockFile ProxyShell and PetitPotam

LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities

The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam…

2000 Exchange servers hacked

Over 2000 Exchange Servers Hacked Using ProxyShell Exploit

Researchers at Huntress Labs estimate that over the past few…

most attacked Linux vulnerabilities

Experts list 15 most attacked Linux vulnerabilities

Trend Micro has published a list of the top threats…

Razer Synapse vulnerability

Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges

A security researcher known as jonhat discovered a 0-day vulnerability…

Hacked the US Census Bureau

Attackers hacked the US Census Bureau using Citrix exploit

The Office of the Inspector General (OIG) reported that unknown…

Vulnerabilities in STARTTLS

Vulnerabilities in STARTTLS threaten popular email clients

At the USENIX conference, a group of German scientists announced…

List of suspects in terrorism

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting…

Print Spooler Vulnerability

Microsoft Warns of New Print Spooler Vulnerability

Microsoft has released a notice of a new vulnerability in…

AI Assistant

Hello! 👋 How can I help you today?