The Security Blog From Gridinsoft

NCA Reveals Identities of REvil tops, LockBit Affiliates Arrests

Evil Corp, LockBit Ransomware Members Arrested, Structure Revealed

Recent UK NCA publications uncover the identities of 16 cybercrime actors that belong to Evil Corp/REvil and LockBit ransomware groups.…

Multiple Vulnerabilities in Linux CUPS Discovered, Allows for RCE

In a recent release, the developers of Linux printing system CUPS disclosed fixing a selection of vulnerabilities. When successfully exploited,…

Lumma Stealer Targets Transportation Companies

Hackers appear targeting logistics and transportation companies in North America with Lumma Stealer. A phishing campaign utilized various info-stealers and…

Fake CAPTCHA Sites Trick Users to Run Malicious Code, Install Lumma Stealer

New malware spreading campaign now picks up steam on the Internet, luring users to fake CAPTCHA websites. People are asked…

Temu Allegedly Hacked, Data Put on Sale On The Darknet

Chinese retailer Temu allegedly suffered a huge data breach. Hackers have put a leaked database for sale on the Darknet,…

RCE Vulnerability In Qualcomm Chips Exposes Millions

Qualcomm RCE Vulnerabilities Expose Millions of Users

Vulnerability in several Qualcomm chipsets allows for remote code execution…

SRLabs Releases Free Black Basta Ransomware Decryptor

Black Basta Ransomware Free Decryptor Available

SRLabs researchers published a free decryptor for BlackBasta ransomware. They…

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

In the intricate landscape of cybersecurity, comprehending the various forms…

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant…

MSIX Installer Protocol Exploited

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to…

Rugmi Loader Surfaces, Spreads Infostealers

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader.…

Xamalicious Trojan Infects Android Devices Through Google Play Apps

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the…

Integris Health Patient Complain About Extortion Emails

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim…

Carbanak is Back With New Distribution Channels

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has…

Crypto Drainer Attack - How do They Work?

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies,…

Russian Hackers Target Ukraine with LonePage Malware

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor…

APT33 targets defense firms with FalseFont malware

FalseFont Malware Targets Defence Contractors Worldwide

The Iranian hacking group APT33 has developed a new malware…

AI Assistant

Hello! 👋 How can I help you today?