The Security Blog From Gridinsoft

Xamalicious Trojan Infects Android Devices Through Google Play Apps

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at the edge of 2023. This malware exhibits potent…

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim to a sophisticated cyberattack, which compromised susceptible patient data. This…

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with new ransomware tactics, marking a significant evolution in…

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies, crypto draining attacks stand in their volume and amount of…

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a…

Worm Raspberry Robin

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection…

Windows 10 malicious installers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from…

GoTrim botnet hacks WordPress

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in…

New version of Truebot

New Version of Truebot Exploits Vulnerabilities in Netwrix Auditor and Raspberry Robin Worm

Information security experts warned of an increase in the number…

Hackers stole from hackers

Hackers Stole over $2.5 million from Hackers

In the past 12 months hackers have scammed more than…

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed…

Hosting of open-source projects Fosshost

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are…

vulnerabilities in Hyundai and Genesis

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for…

FBI and CUBA ransomware

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency…

Cyberspies use USB devices

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets…

older versions of OpenSSL

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure…

Invisible Challenge in TikTok Became a Place to Spread Malware

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge became yet another host for threat actors.…

AI Assistant

Hello! 👋 How can I help you today?