Trigona Ransomware Hacked by Ukrainian Cyber Alliance
Trigona ransomware, a novice threat actor active since late 2022, got its…
TOP 10 Most Dangerous Computer Viruses In History
Computer viruses really resemble real ones. They can infect thousands of computers…
Aluc Service: What Is Aluc Appliaction & How to Remove?
Aluc Service is a strange service you can spectate in the Task…
Exim Vulnerability Allows RCE, No Patches Available
Exim Internet Mailer, a program massively used as a basis for mailing…
Redline and Vidar Stealers Switch to Ransomware Delivery
Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their…
TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams
Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam…
GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner
As a part of the GridinSoft team, I am proud to announce…
3AM Ransomware Backs Up LockBit In Cyberattacks
Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers…
What Is Identity Theft & How to Protect Against It
Identity theft is a significant issue affecting millions yearly, whether through stolen…
Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild
Google released an urgent security update for its Chrome browser. The patch…
Spyware in Fake Telegram Apps Infected Over 10 million Users
It is important to exercise caution when using messenger mods. There have…
Mirai variant “Pandora” infects Android TV for DDoS attacks.
A new variant of the Mirai malware botnet has been detected, infecting…