The Security Blog From Gridinsoft

Internet Archive Hacked, Massive User Database Stolen by Hackers

Archive.org Hacked, Exposing Over 31 Million Users

Archive.org, a worldwide known archive of the entire Internet, suffered a huge data breach. The website was defaced, with a…

Vilsa Trojan Stealer – What It Is

Researchers discovered a new infostealer malware dubbed Vilsa Stealer, with source code published on GitHub. Its easy-to-use interface potentially lowers…

Adobe Commerce Vulnerability CosmicSting Exploited, Fix Now

A research with Darknet monitoring utilities uncovered an active exploitation of a flaw present in Adobe Commerce (previously known as…

FakeUpdate Campaign Spreads WarmCookie Virus in France

FakeUpdate, a campaign of fake browser updates that pops up during regular Internet browsing, now targets users from France. The…

NC Quick Pass Toll SMS Scam Targets North Carolina

NC Quick Pass text messages is a new wave of SMS scam that targets people from North Carolina. It pretends…

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant…

MSIX Installer Protocol Exploited

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to…

Rugmi Loader Surfaces, Spreads Infostealers

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader.…

Xamalicious Trojan Infects Android Devices Through Google Play Apps

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the…

Integris Health Patient Complain About Extortion Emails

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim…

Carbanak is Back With New Distribution Channels

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has…

Crypto Drainer Attack - How do They Work?

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies,…

Russian Hackers Target Ukraine with LonePage Malware

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor…

APT33 targets defense firms with FalseFont malware

FalseFont Malware Targets Defence Contractors Worldwide

The Iranian hacking group APT33 has developed a new malware…

Frauds Exploit Twitter's Feature to Promote Cryptoscams

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications,…

What Are Remote Encryption Attacks?

What are Remote Encryption Attacks? Explanation & Mitigation

The digital world is seeing a surge in remote encryption…

Comcast stated hackers stole data of 35.8 million Xfinity customers

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

Comcast confirms a massive security breach impacting its Xfinity division.…

AI Assistant

Hello! 👋 How can I help you today?