The Security Blog From Gridinsoft

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to be vulnerable to remote code execution (RCE). Another security violation…

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers…

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another…

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this…

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen from Microsoft, including the source codes of Bing, Bing Maps…

Microsoft left Bing open

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft…

Spammers hide behind IP addresses

Spammers hide behind hexadecimal IP addresses

Trustwave experts have discovered that pharmaceutical spam attackers have started…

Mozilla stops Firefox Send

Mozilla completely stops development of Firefox Send and Firefox Notes

This summer, I talked about how ZDNet journalists drew attention…

Chinese hackers attack the US

Chinese hackers attack US organizations and exploit bugs in F5, Citrix and Microsoft Exchange

The Department of Homeland Security (DHS CISA) Cybersecurity and Infrastructure…

Qbot entered the top malware

Qbot Trojan Entered The Top Of The Most Widespread Malware

Check Point has released its monthly Global Threat Index for…

INVDoS bug in Bitcoin Core

The researcher kept the INVDoS bug in Bitcoin Core secret for many years

Back in 2018, cyber security specialist and engineer Braydon Fuller…

Intel fixed a critical bug

Intel engineers fixed critical bug in AMT and ISM

Intel engineers fixed this week a critical bug with updates…

Hackers use Weave Scope

Hackers use legitimate Weave Scope tool in attacks on cloud environments

Intezer experts discovered the TeamTNT cybercriminal group, whose hackers use…

XSS vulnerability in Google Maps

Researcher Earned $10,000 by Finding XSS Vulnerability in Google Maps

Israeli cybersecurity specialist Zohar Shachar talked about his discovery of…

money laundered with cryptocurrencies

SWIFT says money is rarely laundered with cryptocurrencies

Specialists of the SWIFT organization, which operates same-named international system…

hackers use NET library

Hackers use .NET library for creating malicious Excel files

Researchers at NVISO Labs noticed that the Epic Manchego group…

Magecart extract card data

Magecart groupings extract stolen cards data via Telegram

An information security specialist known under the pseudonym Affable Kraut…

AI Assistant

Hello! 👋 How can I help you today?