Grimray Blog


New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware

The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part

New Advanced Backdoor with Distinctive Malware Tactics

Sep 23, 2023THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced backdoor

New Variant of Banking Trojan BBTok Targets Over 40 Latin American Banks

Sep 22, 2023THNMalware / Cyber Threat An active malware campaign targeting Latin America is dispensing

iOS, macOS, Safari, and More Vulnerable

Sep 22, 2023THNZero Day / Vulnerability Apple has released yet another round of security patches

Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace

Sep 20, 2023THNCyber Crime / Dark Web Finnish law enforcement authorities have announced the takedown

ShroudedSnooper’s HTTPSnoop Backdoor Targets Middle East Telecom Companies

Sep 19, 2023THNMalware / Cyber Threat Telecommunication service providers in the Middle East are the

Microsoft AI Researchers Accidentally Expose 38 Terabytes of Confidential Data

Sep 19, 2023THNData Safety / Cybersecurity Microsoft on Monday said it took steps to correct

North Korea’s Lazarus Group Suspected in $31 Million CoinEx Heist

Sep 17, 2023THNCryptocurrency / Cyber Attack The North Korea-affiliated Lazarus Group has stolen nearly $240

TikTok Faces Massive €345 Million Fine Over Child Data Violations in E.U.

Sep 16, 2023THNPrivacy / Technology The Irish Data Protection Commission (DPC) slapped TikTok with a

The Interdependence between Automated Threat Intelligence Collection and Humans

The volume of cybersecurity vulnerabilities is rising, with close to 30% more vulnerabilities found in

Microsoft Uncovers Flaws in ncurses Library Affecting Linux and macOS Systems

Sep 14, 2023THNEndpoint Security / Vulnerability A set of memory corruption flaws have been discovered

New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints

Sep 13, 2023THNKubernetes / Cloud Security Three interrelated high-severity security flaws discovered in Kubernetes could