El blog de seguridad de Gridinsoft

Legit Sites Plagued With Fake Robux Generators

Fake Robux Generators Spread on Government Websites

Recientemente apareció una gran cantidad de generadores Robux falsos en una variedad de sitios web con .gov, .mil, y educación. They commonly

Critical LG TV Vulnerabilities Allow for Command Execution

LG reports fixing four critical vulnerabilities discovered in many of its TVs. Estas vulnerabilidades se encontraron en 2023, y…

Hunt Ransomware ([email protected])

El ransomware Hunt es una nueva muestra de la familia de ransomware Dharma/CrySis que apareció en abril 5, 2024. This malware aims

Two Android Zero-Day Flaws in Google Pixel Exploited

Google ha revelado que se han detectado dos vulnerabilidades de seguridad de día cero de Android en sus smartphones Pixel. El parche ya esta…

Progress Flowmon Command Injection Flaw Discovered

Flujo de progreso, una popular solución de software de monitoreo de red, parece ser vulnerable a la inyección de comando arbitraria. Explotación exitosa del…

Critical Apple Operating Systems Vulnerabilities Exploited

Critical Vulnerability Uncovered in Apple iOS and macOS Exploited

The Cybersecurity and Infrastructure Security Agency has identified a security

White Phoenix Decryptor Gets an Online Version

White Phoenix Decryptor by CyberArk Updated With Web Interface

CyberArk has released an online version of a file decryptor.

GitLab critical vulnerability allows files to be overwritten

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

En una nueva actualización de seguridad, GitLab ha emitido un parche…

Juniper Network's Junos OS Vulnerabilities Revealed

4 Junos OS Vulnerabilities Fixed, Update Now

En el último boletín de seguridad, Juniper Networks announced the release

Panda Security Driver Vulnerabilities Uncovered

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security

Kasseika Ransomware Uses BYOVD Tactics in Attacks

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

Un nuevo ransomware llamado «Kaseika» uses Bring Your Own Vulnerable

Critical Auth Bypass Vulnerability in GoAnywhere MFT

GoAnywhere MFT Auth Bypass Vulnerability Discovered

The fest of vulnerabilities in enterprise software continues with an

RCE Vulnerability in Confluence Exploited in the Wild

Confluence RCE Vulnerability Under Massive Exploitation

Researchers are seeing attempts to exploit a critical vulnerability in

CISA Urges Patching Citrix RCE Vulnerability

2 Citrix RCE Under Active Exploitation, CISA Notifies

CISA ha dado un plazo de una a tres semanas…

LockBit Ransomware Starts Using Word Files For Distribution, Again

LockBit Ransomware Uses Resume Word Files to Spread

Una reciente investigación de ASEC revela las nuevas tácticas de…

SonicWall API vulnerability has left 178,000 firewalls vulnerable to attacks.

Over 178,000 SonicWall Firewalls are Vulnerable to DoS and RCE

Investigaciones recientes descubren una parte importante de las instancias de firewall de SonicWall…

Research Discover 9 Vulnerabilities in EDK II

9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II

una cadena de 9 vulnerabilidades en el entorno de ejecución previo al arranque de UEFI…