Ducktail Infostealer Malware Targeting Facebook Business Accounts
Researchers discovered Ducktail Malware, which targets individuals and organizations on the Facebook…
Visual Studio Code Malicious Plugins Steal Personal Data
Some plugins for Visual Studio Code, a popular code editing tool developed…
RedLine Stealer Issues 100,000 Samples – What is Happening?
Throughout the entire early May 2023, GridinSoft analysts team observed an anomalous…
Grand Explorer Software – Remove Malware & Repair System
Grand Explorer app, or, as it is displayed in the list of…
Fake Windows Update in Browser Deliver Aurora Stealer
Fake Windows Update became a malware spreading way once again. Updates are…
Fullerton India Hacked, LockBit Leaks 600GB of Data
Fullerton India, a large lending institution from India, appears to be hacked…
Ransomware Attacks Increasingly Using AuKill Malware to Disable EDR
A new cybercrime tool called "AuKill" has emerged, which attackers use to…
LOBSHOT malware steals cryptowallets, exploits Google Ads
LOBSHOT, a recently-detected malware family, appears to be a new strong player…
PaperCut Vulnerability Allows RCE, Exploited in the Wild
PaperCut, a software solution used for print management, appears to be vulnerable…
New SLP Vulnerability Allows 2200x DDoS Amplification
A recently-discovered vulnerability in SLP, a legacy network protocol, can be used…
Capita Hacked, Black Basta Gang Publishes Data
Capita, a London-based international business process outsourcing company, was hacked recently. Users…
5 Signs That You’ve Fallen Victim to a Scam
Internet fraud is becoming increasingly widespread and sophisticated. From simple phishing to…