O blog de segurança da Gridinsoft
Cisco Unity Connection Vulnerability Enables Root Access
Cisco has recently addressed a significant security vulnerabilit in its Unity Connection softwarey, identificado como CVE-2024-20272. This flaw poses a…
Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild
Ivanti emitiu um alerta sobre seus dispositivos Connect Secure VPN. Advanced threat actors are exploiting two zero-day vulnerabilities in cyberattacks,…
Water Curupira Hackers Spread PikaBot in Email Spam
Notorious group known as Water Curupira has unleashed a new wave of threats through their sophisticated malware, Pikabot. This menacing…
NoaBot Botnet: The Latest Mirai Offspring
Um novo botnet chamado NoaBot surgiu no início 2023. It reportedly targets SSH servers for cryptocurrency mining using the Mirai…
Apache OFBiz Vulnerability Exposes Millions of Systems
The cyber world has been rattled by the recent discovery of a critical zero-day vulnerability in Apache OFBiz, conhecido como…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation…
Google Is Working on an Information Security Project Called Web Integrity API
A team of four Google engineers is working on a…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It’s not just IT companies racing to develop AI-powered chatbots.…
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday…
Ivanti 0-day exploited to target Norwegian government
Empresa de desenvolvimento de software Ivanti (anteriormente MobileIron Core) has patched a…
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
Com o número cada vez maior de ameaças cibernéticas, hackers and cybersecurity…
Trojan HotRat Is Distributed through Pirated Versions of Software and Games
Avast experts have warned that a new variant of AsyncRAT…
Gozi and IcedID Trojans Spread via Malvertising
Malvertising on Google Search is an unpleasant occurrence where malicious…
Vulnerability in WordPress Plugin WooCommerce Payments Is Actively Used to Hack Sites
Hackers use a vulnerability in the widely used WooCommerce Payments…