The Security Blog From Gridinsoft

Scammers Use Corrupted Word Documents In Phishing Attacks

Corrupted Word Documents Phishing Attacks Avoid Security Checks

Hackers found a new way of bypassing the email security filters and anti-malware software – corrupted MS Word documents. As…

CISA Urges to Patch Critical Array Networks Vulnerabilities

The US cybersecurity agency CISA warned about the ongoing exploitation of a critical-severity flaw in Array Networks’ secure access gateway…

Meta Deletes 2 Million Accounts Related to Scams

Meta has intensified its fight against pig butchering scams, removing over 2 million accounts linked to these operations on Facebook…

NodeStealer Returns With Python Codebase, More Functions

Researchers have identified an updated version of NodeStealer, now rewritten in Python. This version is capable of extracting additional information…

Meta Security Email Phishing Scams Explained

Attackers are targeting users of Meta services with phishing attacks. Classic fraud schemes are gaining momentum once again, with users…

Infostealers Disguised as Adobe Reader Target Brazil

Adobe Reader Infostealer Plagues Email Messages in Brazil

A recent email spam campaign reportedly spreads infostealer malware under…

BianLian use JetBrains' TeamCity Flaws to Deploy Backdoors

BianLian Exploits TeamCity Vulnerability to Deploy Backdoors

BianLian, a group of cybercriminals known for their ransomware attacks,…

Microsoft is Hacked Again by Midnight Blizzard

Microsoft is Hacked, Again by Midnight Blizzard

Microsoft acknowledges being hacked for the second time this year,…

The Phantom Hacker Scams

Phantom Hacker Scams On The Rise, Target Elderly

Phantom hacker scams is a specific type of fraud that…

WogRAT Malware (WingsOfGod.dll) - Teardown and Removal Tutorial

WingsOfGod.dll – WogRAT Malware Analysis & Removal

WogRAT, also known as WingsOfGod RAT, is a novice remote…

ALPHV/BlackCat Shuts Down In Supposed Exit Scam

ALPHV Ransomware Shut Down, Exit Scam Supposed

On March 5, 2024, ALPHV/BlackCat ransomware claimed its shutdown, “due…

LockBit Ransomware is Back After Europol Takedown

LockBit is Back With New Claims and Victims

The story around LockBit ransomware takedown on February 19 continues…

MrB Ransomware Analysis & Removal Guide

MrB Ransomware (.mrB Files) – Analysis & File Decryption

MrB ransomware is a new Dharma ransomware sample, discovered on…

NCA Claims LockBit Takedown in Operation Cronos

LockBit Ransomware Taken Down by NCA

On February 19, 2024, LockBit ransomware was taken down by…

SYSDF Ransomware (Dharma) Description & Removal Guide

SYSDF Ransomware (.SYSDF Files) – Malware Analysis & Removal

SYSDF is a ransomware-type program that belongs to the Dharma…

MIT Students' Data Leaked On the Darknet

MIT Hacked, Students’ Data Sold on the Darknet

On February 13, 2024, a post on a Darknet forum…

US DoJ stops Warzone RAT and arrests its operators

Warzone RAT Dismantled, Members Arrested

In an international law enforcement operation, the U.S. Department of…

AI Assistant

Hello! 👋 How can I help you today?