The Security Blog From Gridinsoft
2024 Olympic Cyberattack Risks: What Should We Expect
The Olympic Games is a massive sporting event that attracts billions of people worldwide. But where there are thousands of…
India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS phishing scams, particularly targeting iPhones. They mimic delivery…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings.…
Jellyfish Loader Malware Discovered, Threatens 2024 Olympics
A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader…
GitHub and GitLab CDNs Abused to Spread Malware
Recent research around new spreading approaches of one stealer malware…
OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes
Microsoft security blog reports that the OpenMetadata platform has critical…
MITRE NERVE Hacked, Service Taken Offline
MITRE reports about hacker activity in their NERVE network, spotted…
LabHost Phishing Service Taken Down by Police
Authorities have seized the LabHost phishing service, accused of stealing…
Cisco Talos Warns of a Massive Brute Force Wave
The Cisco Talos security team has released information about a…
Critical PAN-OS Command Injection Flaw Exploited
Palo Alto Networks warns its customers regarding a vulnerability in…
Fake Robux Generators Spread on Government Websites
Huge number of fake Robux generators recently appeared on a…
Critical LG TV Vulnerabilities Allow for Command Execution
LG reports fixing four critical vulnerabilities discovered in many of…
Hunt Ransomware ([email protected])
Hunt ransomware is a new sample of the Dharma/CrySis ransomware…
Two Android Zero-Day Flaws in Google Pixel Exploited
Google has disclosed that two Android zero-day security vulnerabilities have…
Progress Flowmon Command Injection Flaw Discovered
Progress Flowmon, a popular network monitoring software solution, appears to…
XZ Utils Backdoor Discovered, Threating Linux Servers
A backdoor in liblzma library, a part of XZ data…