The Security Blog From Gridinsoft

SYSDF Ransomware (Dharma) Description & Removal Guide

SYSDF Ransomware (.SYSDF Files) – Malware Analysis & Removal

SYSDF is a ransomware-type program that belongs to the Dharma malware family. Such malicious software aims mainly at small companies,…

MIT Hacked, Students’ Data Sold on the Darknet

On February 13, 2024, a post on a Darknet forum appeared, offering to purchase a large pack of data leaked…

Warzone RAT Dismantled, Members Arrested

In an international law enforcement operation, the U.S. Department of Justice continues its fight against cybercriminals. The operation dismantled a…

HijackLoader Malware Comes With New Evasion Methods

The HijackLoader malware has added new defense evasion techniques. Other threat actors are increasingly using the malware to deliver payloads…

New Fortinet VPN RCE Flaw Discovered, Patch ASAP

Fortinet has issued a warning about a recently discovered critical vulnerability in its FortiOS SSL VPN system that could be…

Malicious USB campaign

Chinese Hackers Accidentally Infected European Hospital with Malware

Check Point analysts found that Chinese hackers in a chain…

Fake Super Mario Game Spreads Umbral Stealer

Super Mario Malware: Hackers Spread Stealers in the Fake Game

The Super Mario video game franchise has gained immense acclaim…

Reset MFA in LastPass

LastPass Users Can’t Login to App after Resetting MFA

Since May 2023, users of the LastPass password manager have…

RepoJacking and GitHub attacks

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are…

Condi malware builds a botnet

Condi Malware Builds a Botnet from TP-Link Routers

In May 2023, a new Condi malware, focused on DDoS…

ChatGPT Accounts Are Compromised by Stealer Malware

Over 100k ChatGPT Accounts Are For Sale on the Darknet

According to a new report, over the past year, over…

APT28 attacked Ukrainian organizations

APT28 Attacked Ukrainian and Polish Organizations

Recorded Future, in collaboration with CERT-UA researchers, has unveiled a…

Freaky Leaky SMS

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Researchers have created a side-channel attack called “Freaky Leaky SMS”,…

Credentials Theft & Emails Scams - How to Protect?

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and…

Keys for Windows 11 Pro

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google…

NortonLifeLock Hacked Via MOVEit Vulnerability

NortonLifeLock Hacked by Cl0P Gang, Using MOVEit Vulnerability

NortonLifeLock, the world-famous antivirus software developer, had reportedly been hacked…

Shuckworm attacks Ukrainian companies

Shuckworm Gang Attacks Ukrainian Companies Using Pterodo Backdoor and USB Drives

Symantec experts report that the Shuckworm hack group (aka Armageddon,…