The Security Blog From Gridinsoft

FIN8 created a new Backdoor to inject Noberus Ransomware

FIN8 Updated Sardonic Backdoor to Deliver Noberus Ransomware

FIN8, an infamous group of cybercriminals, has updated its backdoor malware to avoid being detected. They made improvements and prepared…

Citrix and Adobe Vulnerabilities Under Active Exploitation

Citrix was able to patch a zero-day vulnerability, while Adobe warns of attacks using ColdFusion Zero-Day and releases an urgent…

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular favourite for the final payload is the infamous…

Hundreds of Military and Intelligence Agencies Uploaded Data to VirusTotal

An employee of the Google-owned platform VirusTotal accidentally uploaded a file with the names, email addresses and other data of…

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing attacks, such as the new WormGPT tool. WormGPT…

BrakTooth threaten billions of devices

BrakTooth vulnerabilities threaten billions of devices around the world

A group of researchers has published information on 16 serious…

malware in AMD and Nvidia

Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale

Bleeping Computer discovered that an exploit that uses the memory…

ProxyToken vulnerability in Microsoft Exchange

ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange

A dangerous vulnerability called ProxyToken has been discovered in Microsoft…

Critical vulnerability in Cosmos DB

Microsoft warned of a critical vulnerability in Cosmos DB

Microsoft has warned thousands of Azure customers of a critical…

ransomware LockFile ProxyShell and PetitPotam

LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities

The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam…

2000 Exchange servers hacked

Over 2000 Exchange Servers Hacked Using ProxyShell Exploit

Researchers at Huntress Labs estimate that over the past few…

most attacked Linux vulnerabilities

Experts list 15 most attacked Linux vulnerabilities

Trend Micro has published a list of the top threats…

Razer Synapse vulnerability

Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges

A security researcher known as jonhat discovered a 0-day vulnerability…

Hacked the US Census Bureau

Attackers hacked the US Census Bureau using Citrix exploit

The Office of the Inspector General (OIG) reported that unknown…

Vulnerabilities in STARTTLS

Vulnerabilities in STARTTLS threaten popular email clients

At the USENIX conference, a group of German scientists announced…

List of suspects in terrorism

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting…

AI Assistant

Hello! 👋 How can I help you today?