O blog de segurança da Gridinsoft

Hunt Ransomware () - Decrypt Guide & Removal

Hunt Ransomware ([email protected])

Hunt ransomware é uma nova amostra da família de ransomware Dharma/CrySis que apareceu em abril 5, 2024. Este malware tem como objetivo…

Two Android Zero-Day Flaws in Google Pixel Exploited

O Google divulgou que duas vulnerabilidades de segurança de dia zero do Android foram detectadas em seus smartphones Pixel. O patch já está…

Progress Flowmon Command Injection Flaw Discovered

Fluxo de Progresso, uma solução popular de software de monitoramento de rede, parece ser vulnerável à injeção arbitrária de comandos. Exploração bem-sucedida do…

XZ Utils Backdoor Discovered, Threating Linux Servers

Um backdoor na biblioteca liblzma, a part of XZ data compression tool was discovered by Andres Freund. The maintainer of

UnitedHealth Hack Leaks 6 TB of User Data

Grupo UnitedHealth, um dos maiores provedores de seguros de saúde e serviços de saúde nos Estados Unidos, suffered a

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

Em uma nova atualização de segurança, GitLab lançou um patch…

Juniper Network's Junos OS Vulnerabilities Revealed

4 Junos OS Vulnerabilities Fixed, Update Now

No último boletim de segurança, Juniper Networks announced the release

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

Um novo ransomware chamado “Kasseika” uses Bring Your Own Vulnerable

Critical Auth Bypass Vulnerability in GoAnywhere MFT

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an

RCE Vulnerability in Confluence Exploited in the Wild

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in

CISA Urges Patching Citrix RCE Vulnerability

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA has given a timeframe of one to three weeks

LockBit Ransomware Starts Using Word Files For Distribution, Again

LockBit Ransomware Uses Resume Word Files to Spread

A recent investigation by ASEC reveals the new tactics of

SonicWall API vulnerability has left 178,000 firewalls vulnerable to attacks.

Over 178,000 SonicWall Firewalls are Vulnerable to DoS and RCE

Recent research uncovers a significant portion of SonicWall firewall instances

Research Discover 9 Vulnerabilities in EDK II

9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II

Uma cadeia de 9 vulnerabilidades no ambiente de execução pré-inicialização da UEFI…

New Chrome 0-day Vulnerability Exploited, Patch Available

New Google Chrome 0-day Vulnerability Exploited, Update Now

Nas notas de versão mais recentes, Google reports about a

FBot Malware Targets Cloud and Payment Services.

Novice FBot Stealer Targets Cloud Services

Pesquisadores relatam sobre uma nova cepa de malware chamada FBot. Esse…