The Security Blog From Gridinsoft

RCE Vulnerability In Qualcomm Chips Exposes Millions

Qualcomm RCE Vulnerabilities Expose Millions of Users

Vulnerability in several Qualcomm chipsets allows for remote code execution during the phone call. This and other vulnerabilities were uncovered…

Black Basta Ransomware Free Decryptor Available

SRLabs researchers published a free decryptor for BlackBasta ransomware. They discovered the vulnerability in the way malware handles the encryption…

Seven Common Types of Malware – Analysis & Description

In the intricate landscape of cybersecurity, comprehending the various forms of malware is crucial. This article offers an in-depth look…

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This method capitalizes on executables in the trusted WinSxS…

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation in real-world cyberattacks. Hackers found a way to…

Generate Ad Traffic

42,000 Sites Generate Ad Traffic Pretending to Be Famous Brands

The Chinese group Fangxiao has built a huge network of…

MSIL/Microsoft.Bing.A detection

MSIL/Microsoft.Bing.A Detection (BingWallpaper.exe)

A lot of users on different forums complain about MSIL/Microsoft.Bing.A…

Ukrainian Cyber Police and Europol

Ukrainian Cyber Police and Europol Arrested Fraudsters Involved in Fake Investments

The Ukrainian cyber police and Europol have arrested five members…

Kmsdbot malware performs DDoS attacks and mines cryptocurrency

KmsdBot malware combines DDoS-attacks and coin mining

A new malware, called KmsdBot, strikes user devices. The Akamai…

Attackers hacked 15000 sites

Attackers Hacked 15,000 Websites to Poison SEO

Sucuri analysts have discovered a massive hacking campaign in which…

scan all devices in the country

British Experts Scan All Devices in the Country Looking for Vulnerabilities

The UK’s National Cyber Security Center (NCSC) said its experts…

Yanluowang hacker group

Logs of Internal Chats of the Russian Hacker Group Yanluowang Leaked to the Network

Information security experts report a hack of the Yanluowang hacker…

Malware Notebook Data

Emotet Botnet Resumed Activity after Five Months of Inactivity

The Emotet botnet resumed activity and began sending out malicious…

Critical vulnerability in OpenSSL

OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical

At the end of October, OpenSSL developers warned that the…

Azov ransomware sets up analysts and tries to show up as pro-Ukrainian

Azov Ransomware Tries to Set Up Cybersecurity Specialists

Azov ransomware, a newcomer to the encryption malware market, appears…

Raspberry Robin worm operators

Raspberry Robin Worm Operators Now Trade Access

Microsoft researchers reported that the operators of the hack group,…

AI Assistant

Hello! 👋 How can I help you today?