gridinsoft-logo
  • Products
    • Anti-Malware
    • Trojan Killer [Portable Edition]
    • Trojan Scanner [Android Edition]
    • Comparison
  • Our Team
    • Find a Job
    • COURSES FOR DEVELOPERS
  • Resources
    • Tech News & Security Tips
    • Learn About Cybersecurity
    • Reviews
    • Help Center
    • Release History
  • Contacts
  • | Member Area |
  • DOWNLOAD NOW
  • CN
  • UA
Skip to content
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs
Logo

Author: Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.
  • Security News

Information Security Specialist Showed How to Steal a Tesla Car

imageByVladimir KrasnogolovyMay 19, 2022
Information Security Specialist Showed How to Steal a Tesla Car
Sultan Qasim Khan, a security consultant of the NCC Group, has disclosed a vulnerability that allows attackers to enter the salon and steal a Tesla car. The vulnerability consists of the redirection of communication between the Tesla owner’s smartphone or key fob and

Read More

  • Security News

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

imageByVladimir KrasnogolovyMay 18, 2022
Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware
An unknown hacker attacked German users who are interested in information about the Russian invasion of Ukraine, infecting them with PowerShell RAT malware (more precisely, a remote access trojan) and stealing their data. Let me remind you that we wrote that Hacker groups

Read More

  • Security News

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

imageByVladimir KrasnogolovyMay 17, 2022
Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay
In May, Microsoft released a security update, as it had previously not fully coped with attacks called PetitPotam. The update and mitigation recommendations target a heavily exploited vulnerability in NTLM Relay called Windows LSA Spoofing Vulnerability with the number

Read More

  • Security News

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

imageByVladimir KrasnogolovyMay 1, 2022
Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites
Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was hit by large-scale DDoS attacks. CERT-UA has published a report on ongoing DDoS attacks on Ukrainian websites and a government web portal. Unknown attackers compromise WordPress sites and inject

Read More

  • Security News

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

imageByVladimir KrasnogolovyApril 29, 2022
Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials
Secureworks researchers have discovered a phishing campaign by Chinese Mustang Panda cyberspies targeting Russian officials and the military. According to experts, Chinese “government” hackers from the Mustang Panda group (aka HoneyMyte, Bronze President,

Read More

  • Security News

Vulnerabilities in Linux Allow Gaining Superuser Rights

imageByVladimir KrasnogolovyApril 27, 2022
Vulnerabilities in Linux Allow Gaining Superuser Rights
A Microsoft specialist has discovered vulnerabilities in Linux systems, the exploitation of which allows quickly gaining superuser rights. In total, two vulnerabilities were discovered (CVE-2022-29799 and CVE-2022-29800) and united under the common name Nimbuspwn. Problems

Read More

  • Security News

Emotet Malware Operators Found a Bug in Their Bootloader

imageByVladimir KrasnogolovyApril 26, 2022
Emotet Malware Operators Found a Bug in Their Bootloader
Emotet malware operators have fixed a bug due to which, after opening a malicious document the system was not infected, and launched a phishing campaign again. Let me remind you, by the way, that at the end of last year we wrote that Microsoft patches Windows AppX Installer

Read More

  • Security News

T-Mobile Admits that Lapsus$ Hack Group Stole Its Source Codes

imageByVladimir KrasnogolovyApril 25, 2022
T-Mobile Admits that Lapsus$ Hack Group Stole Its Source Codes
Information security specialist Brian Krebs found out that even before the arrests, the Lapsus$ hack group managed to compromise the telecom giant T-Mobile. The company confirmed this information, saying that a few weeks ago, hackers penetrated the company’s network,

Read More

  • Security News

Amazon Patch for Log4Shell allowed privilege escalation

imageByVladimir KrasnogolovyApril 22, 2022
Amazon Patch for Log4Shell allowed privilege escalation
Palo Alto Networks warns that a patch released by Amazon to protect AWS from high-profile issues in Apache Log4j, including the Log4Shell vulnerability, poses a threat to users. The patch can be used to escape the container and escalate privileges, allowing an attacker to

Read More

  • Security News

Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks

imageByVladimir KrasnogolovyApril 21, 2022
Hackers Use Fresh Vulnerability in Windows Print Spooler in Real Attacks
The US Infrastructure and Cybersecurity Agency (CISA) warned that a vulnerability in the Windows Print Spooler component, patched by Microsoft in February 2022, is being actively exploited by hackers. The issue in question is tracked as CVE-2022-22718 (CVSS score of 7.8)

Read More

Posts navigation

Page 1 Page 2 … Page 53 NextNext page

Trending Articles

How To Reset Browser Settings?

June 23, 2018

How To Send System Information For Analysis

June 23, 2018

How To restore quarantined files?

June 15, 2018

Image
Use Strong Passwords to Can’t be Hacked Warning Signs That Your Computer Is Infected: Does Your Computer Have Viruses How annoying these messages are! My mailbox is flooded with these nasty offers, and I sometimes struggle to understand if the message is normal or spam!. Can I solve that?

Our Products:

  • Anti-Malware
  • Trojan Killer Portable
  • Android Trojan Scanner

Member Area:

  • Sign In

Solutions:

  • Spyware Remover
  • Ransomware Protection Tool
  • Virus Scanner & Removal Tool
  • Trojan Scanner & Removal Tool
  • Adware Removal Tool

Cybersecurity:

  • Spyware
  • Malware
  • Ransomware
  • Hacking
  • Darknet
  • Exploits
  • Antivirus
  • Adware
  • Backdoor
  • Botnet
  • Data Breaches
  • DDoS
  • Phishing
  • Trojan
Footer Logo
  • Terms of Use
  • Privacy Policy
  • How to Uninstall
  • How we use your data
Copyright © Gridinsoft LLC
Logo
  • Security News
  • Tips & Tricks
  • Mobile Security
  • Gridinsoft Labs

Latest Articles

  • TOP Facts About Adware Attacks To Be Reminded TodayMay 21, 2022
  • Reasons Why An Antivirus Is Important: Advantages Of Using An AntivirusMay 20, 2022
  • Information Security Specialist Showed How to Steal a Tesla CarMay 19, 2022
  • Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT MalwareMay 18, 2022
  • Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM RelayMay 17, 2022