gridinsoft-logo
  • Products
    • Anti-Malware
    • Trojan Killer [Portable Edition]
    • Trojan Scanner [Android Edition]
    • Comparison
  • Our Team
    • Find a Job
    • COURSES FOR DEVELOPERS
  • Resources
    • Tech News & Security Tips
    • Learn About Cybersecurity
    • Reviews
    • Help Center
    • Release History
  • Contacts
  • | Member Area |
  • DOWNLOAD NOW
  • CN
  • UA
Skip to content
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs
Logo

Tag: Vulnerabilities

  • Security News

Vulnerability in HP BIOS causes system takeover

imageByStephanie AdlamMay 13, 2022
Vulnerability in HP BIOS causes system takeover
Following recent fixes for a large number of UEFI vulnerabilities, worldwide-known PC and laptop vendor HP is releasing a new BIOS update. This time around, two serious vulnerabilities affecting a wide range of over 200 PC and laptop models that allow code to run with kernel

Read More

  • Security News

Vulnerability in ransomware can prevent the encryption

imageByStephanie AdlamMay 11, 2022
Vulnerability in ransomware can prevent the encryption
Not a long time ago, a cybersecurity analyst posted a video on YouTube where he shows the vulnerability in ransomware samples used by well-known ransomware groups. In the footage, expert shows this exploit usage on the REvil ransomware sample, but there are half a dozen of

Read More

  • Security News

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

imageByStephanie AdlamMay 6, 2022
A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices
A vulnerability has been discovered (CVE not yet issued) in uClibc and uClibc-ng C standard libraries. These libraries are vastly used in IoT devices. The newly found vulnerability makes it possible to place forged data into the DNS cache, allowing to set an arbitrary IP

Read More

  • Security News

F5 warns of critical BIG-IP RCE vulnerability

imageByStephanie AdlamMay 5, 2022
F5 warns of critical BIG-IP RCE vulnerability
F5, Inc warned the users about the critical vulnerability that harms the iControl REST users. That solution is a framework offered by the F5 Corporation as an advanced tool for software developers. The detected flaw is noted as critical, since it makes the device takeover

Read More

  • Security News

Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks

imageByVladimir KrasnogolovyApril 21, 2022
Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks
The US Infrastructure and Cybersecurity Agency (CISA) warned that a vulnerability in the Windows Print Spooler component, patched by Microsoft in February 2022, is being actively exploited by hackers. The issue in question is tracked as CVE-2022-22718 (CVSS score of 7.8)

Read More

  • Security News

Chinese hackers use Zimbra 0-day vulnerability to hack European media and authorities

imageByVladimir KrasnogolovyFebruary 4, 2022
Chinese hackers use Zimbra 0-day vulnerability to hack European media and authorities
Security firm Volexity has warned that a previously unknown Chinese hack group is exploiting a 0-day vulnerability in Zimbra’s collaborative software. According to official statistics, more than 200,000 enterprises in 140 countries around the world use Zimbra,

Read More

  • Security News

Another vulnerability found in Log4j, this time it is a denial of service

imageByVladimir KrasnogolovyDecember 21, 2021
Another vulnerability found in Log4j, this time it is a denial of service
Log4Shell, recently discovered in the popular logging library Log4j, which is part of the Apache Logging Project, continues to get worse, as another vulnerability has been found. This time it is time a “denial of service” vulnerability. The problem was originally discovered

Read More

  • Security News

Vulnerabilities in STARTTLS threaten popular email clients

imageByVladimir KrasnogolovyAugust 18, 2021
Vulnerabilities in STARTTLS threaten popular email clients
At the USENIX conference, a group of German scientists announced the discovery of more than 40 vulnerabilities in STARTTLS implementations in popular mail clients and servers, including Apple Mail, Gmail, Mozilla Thunderbird, Claws Mail, Mutt, Evolution, Exim, Mail.ru,

Read More

  • Security News

Hackers exploit ProxyShell vulnerabilities to install backdoors

imageByVladimir KrasnogolovyAugust 16, 2021
Hackers exploit ProxyShell vulnerabilities to install backdoors
Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities, and installing backdoors on them for subsequent access. Let me remind you that the vulnerabilities, which are collectively called ProxyShell, were recently discussed at

Read More

  • Security News

Microsoft Warns of New Print Spooler Vulnerability

imageByVladimir KrasnogolovyAugust 13, 2021
Microsoft Warns of New Print Spooler Vulnerability
Microsoft has released a notice of a new vulnerability in Print Spooler (CVE-2021-36958) that allows local attackers to gain system privileges on a computer. The new vulnerability is related to other PrintNightmare bugs that exploit the configuration settings for Print

Read More

Posts navigation

Page 1 Page 2 NextNext page

Trending Articles

How To Reset Browser Settings?

June 23, 2018

How To Send System Information For Analysis

June 23, 2018

How To restore quarantined files?

June 15, 2018

Image
Use Strong Passwords to Can’t be Hacked Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses How annoying these messages are! My mailbox is flooded with these nasty offers, and I sometimes struggle to understand if the message is normal or spam!. Can I solve that?

Our Products:

  • Anti-Malware
  • Trojan Killer Portable
  • Android Trojan Scanner

Member Area:

  • Sign In

Solutions:

  • Spyware Remover
  • Ransomware Protection Tool
  • Virus Scanner & Removal Tool
  • Trojan Scanner & Removal Tool
  • Adware Removal Tool

Cybersecurity:

  • Spyware
  • Malware
  • Ransomware
  • Hacking
  • Darknet
  • Exploits
  • Antivirus
  • Adware
  • Backdoor
  • Botnet
  • Data Breaches
  • DDoS
  • Phishing
  • Trojan
Footer Logo
  • Terms of Use
  • Privacy Policy
  • How to Uninstall
  • How we use your data
Copyright © Gridinsoft LLC
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs

Latest Articles

  • Information Security Specialist Showed How to Steal a Tesla CarMay 19, 2022
  • Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT MalwareMay 18, 2022
  • Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM RelayMay 17, 2022
  • What Is Internet Protocol: IP Address DefinitionMay 16, 2022
  • What is SSL Certificate?May 16, 2022