The Security Blog From Gridinsoft

2024 Olympic Cyberattack Risks: What Should We Expect

The Olympic Games is a massive sporting event that attracts billions of people worldwide. But where there are thousands of…

India Post SMS Phishing Targets Mobile Users in India

Massive complaints come from Indian users regarding a new wave of SMS phishing scams, particularly targeting iPhones. They mimic delivery…

Docker Engine Authentication Bypass Vulnerability Exploited

Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain…

Hamster Kombat Players Targeted in a New Malware Spreading Scheme

Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings.…

Jellyfish Loader Malware Discovered, Threatens 2024 Olympics

A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader…

Hackers abuse GitHub and GitLab CDNs to Spread Malware

GitHub and GitLab CDNs Abused to Spread Malware

Recent research around new spreading approaches of one stealer malware…

OpenMetadata Vulnerabilities Threats Kubernetes Workloads, Actively Exploited

OpenMetadata Vulnerabilities Exploited to Abuse Kubernetes

Microsoft security blog reports that the OpenMetadata platform has critical…

MITRE Reports State-Sponsored Actor Hacking Into NERVE

MITRE NERVE Hacked, Service Taken Offline

MITRE reports about hacker activity in their NERVE network, spotted…

Police Operation Halts LabHost Phishing Service

LabHost Phishing Service Taken Down by Police

Authorities have seized the LabHost phishing service, accused of stealing…

Сisco Talos warn of a massive attack

Cisco Talos Warns of a Massive Brute Force Wave

The Cisco Talos security team has released information about a…

Critical Vulnerability in PAN-OS Exploited

Critical PAN-OS Command Injection Flaw Exploited

Palo Alto Networks warns its customers regarding a vulnerability in…

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Huge number of fake Robux generators recently appeared on a…

LG TV Critical Vulnerabilities Uncovered

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of…

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware is a new sample of the Dharma/CrySis ransomware…

Zero-Day Android Flaws Exploited in Targeted Attacks

Two Android Zero-Day Flaws in Google Pixel Exploited

Google has disclosed that two Android zero-day security vulnerabilities have…

Flowmon Critical Vulnerability Threatens Network Infrastructure

Progress Flowmon Command Injection Flaw Discovered

Progress Flowmon, a popular network monitoring software solution, appears to…

XZ Utils Backdoor Allows for Unauthorized SSH Access

XZ Utils Backdoor Discovered, Threating Linux Servers

A backdoor in liblzma library, a part of XZ data…