The Security Blog From Gridinsoft

Ransomware Income Dropped

Ransomware Revenues Dropped by 40% because Victims Refuse to pay

Ransomware revenue (from ransomware attacks) has fallen from $765.6 million in 2021 to $456.8 million in 2022, according to Chainalysis…

Cybersecurity Specialists Advise Players Not to Enter Grand Theft Auto (GTA) Online due to a Dangerous Bug

Players of the PC version of Grand Theft Auto (GTA) Online are alarming as a vulnerability has been discovered in…

Attackers Can Use GitHub Codespaces to Host and Deliver Malware

Trend Micro reports that the GitHub Codespaces cloud development environment, available to the public use since November 2022, can be…

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements in search engine results. Ads up there are called to…

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are actively discussing access to bypass geo-blocking, due to which the…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free…

Winnti attacked Hong Kong universities

Winnti hacking group attacked Hong Kong universities

ESET experts found that during protests that began back in…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic…

REvil (Sodinokibi) working methods

IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators

Information security specialists of the Danish provider KPN applied sinkholing…

Airports use vulnerable sites

97 of the 100 largest airports use vulnerable sites and web applications

Specialists from the Swiss company ImmuniWeb conducted an analysis of…

Microsoft open Windows 7 source code

Free Software Foundation encourages Microsoft to open Windows 7 source code

Admit that are you already tired of the news about…

Citrix Releases New Patches

Citrix releases new patches, racing with the hackers that install encryptors on vulnerable machines

Destructive race: Citrix releases new patches, and hackers are actively…

Windows 7 - End of Life

Windows 7 users will not receive a patch for critical vulnerability in the IE

Microsoft said Windows 7 users would not receive a patch…

AI Assistant

Hello! 👋 How can I help you today?