The Security Blog From Gridinsoft

Russian Hackers Target Ukraine with LonePage Malware

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a…

FalseFont Malware Targets Defence Contractors Worldwide

The Iranian hacking group APT33 has developed a new malware called FalseFont. They use it to target the Defense Industrial…

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges…

What are Remote Encryption Attacks? Explanation & Mitigation

The digital world is seeing a surge in remote encryption attacks – a sophisticated ransomware attack. Although there is nothing…

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

Comcast confirms a massive security breach impacting its Xfinity division. Nearly 36 million customers of the world’s largest telecom provider…

Goose Goose Duck

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

The free social detective Goose Goose Duck, which recently broke…

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active…

AI VALL-E from Microsoft

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for…

Hackers bypass CAPTCHA

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for…

Slack repositories on GitHub

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year,…

Windows 7 ESU Cancelled

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the…

to eavesdrop on Android devices

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed…

Hackers use Excel add-ins

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel…

Hackers abuse Google Ads

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads…

Hackers stole data from LastPass

Hackers Stole Data from the LastPass Use Password Vault

LastPass password manager developers have reported that hackers who recently…

Worm Raspberry Robin

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection…

Windows 10 malicious installers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from…