The Security Blog From Gridinsoft

exploit for vulnerability in GoAnywhere MFT

Hackers Published an Exploit for a Dangerous Vulnerability in GoAnywhere MFT

Hackers published on the network an exploit for a zero-day vulnerability that is actively used in the GoAnywhere MFT administration…

ESXiArgs Ransomware Launches Massive Attacks on VMware ESXi Servers

Hosting providers and the French CERT warn that more than 3,200 VMware ESXi servers were compromised by the new ESXiArgs…

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming…

Dangerous RCE Vulnerability in GTA Online Fixed

Rockstar Games has finally released a patch for a dangerous RCE vulnerability in GTA Online that allowed loss of game…

Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store

The Pig Butchering scam, a scam operation that specializes in fake investments in allegedly promising cryptocurrency projects, stocks, bonds, futures…

Evil Corp with WastedLocker Ransomware

Evil Corp returns to criminal activity with WastedLocker ransomware

Fox-IT experts talked about the latest activity of the famous…

Hackers force to solve CAPTCHA

Hackers force users to solve CAPTCHA

Microsoft analysts have discovered a malicious campaign, in which hackers…

AMD SMM Callout bugs

AMD plans to fix SMM Callout bugs in its processors by the end of June

AMD reports that firmware updates will be released for three…

EBay organized persecution of bloggers

eBay employees organized persecution and intimidation of a family of bloggers

Six former eBay employees became involved in a strange trial.…

Chrome spyware installation campaign

Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps…

Vulnerabilities in Old GTP

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling…

GitHub will replace the term "master"

GitHub will replace the term “master” with a more neutral one

Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said…

CloudEyE collaborated with ransomware operators

Italian IT company CloudEyE collaborated with ransomware operators

For about four years, the Italian company CloudEyE was engaged…

SGAxe endangers Intel processors

SGAxe attack endangers Intel processors

As part of the June “Update Tuesday,” Intel fixed more…

Microsoft fixed 129 vulnerabilities

On June “Patch Tuesday” Microsoft fixed 129 vulnerabilities in its products

“Patch Tuesday” this month became the largest in the history…

Ransomware Tycoon uses JIMAGE

Tycoon ransomware uses exotic JIMAGE format to avoid detection

BlackBerry experts have discovered an unusual multi-platform (for Windows and…

YouTube Channel Credentials

Hacker forums show growing demand for credentials from YouTube channels

IntSights experts found that recently in the darknet there increased…