The Security Blog From Gridinsoft

Clop and GoAnywhere MFT

Clop Operators Claim to Hack 130 Organizations Using GoAnywhere MFT Bug

Clop ransomware operators claim to be behind recent attacks on a 0-day vulnerability in the GoAnywhere MFT secure file transfer…

Hackers Are Promoting a Service That Allows Bypassing ChatGPT Restrictions

Check Point researchers say that the OpenAI API is poorly protected from various abuses, and it is quite possible to…

TrickBot Members Sanctioned By U.S. and UK

US and UK law enforcements imposed sanctions against 7 members of a cybercrime gang that stands after TrickBot malware, including…

Hackers Published an Exploit for a Dangerous Vulnerability in GoAnywhere MFT

Hackers published on the network an exploit for a zero-day vulnerability that is actively used in the GoAnywhere MFT administration…

ESXiArgs Ransomware Launches Massive Attacks on VMware ESXi Servers

Hosting providers and the French CERT warn that more than 3,200 VMware ESXi servers were compromised by the new ESXiArgs…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

Xhelper malware continues to infect Android devices. Moreover, the Xhelper…

Microsoft recommends disabling SMBv1

Microsoft recommends Exchange administrators to disable SMBv1

Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange…

0-day vulnerability in Internet Explorer

Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products

Recent February “update Tuesday” became the largest for Microsoft in…

Increase of supply chains attacks

FBI warned about increase of supply chains attacks

The FBI has warned private sector companies of an active…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free…

Winnti attacked Hong Kong universities

Winnti hacking group attacked Hong Kong universities

ESET experts found that during protests that began back in…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic…

REvil (Sodinokibi) working methods

IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators

Information security specialists of the Danish provider KPN applied sinkholing…

AI Assistant

Hello! 👋 How can I help you today?