The Security Blog From Gridinsoft

New DLL Search Order Hijacking Method Exploited in the Wild

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This method capitalizes on executables in the trusted WinSxS…

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation in real-world cyberattacks. Hackers found a way to…

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact…

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at the edge of 2023. This malware exhibits potent…

Integris Health Hacked, Patients Receive Ransom Emails

Integris Health, Oklahoma’s most extensive not-for-profit health network, fell victim to a sophisticated cyberattack, which compromised susceptible patient data. This…

Kmsdbot malware performs DDoS attacks and mines cryptocurrency

KmsdBot malware combines DDoS-attacks and coin mining

A new malware, called KmsdBot, strikes user devices. The Akamai…

Attackers hacked 15000 sites

Attackers Hacked 15,000 Websites to Poison SEO

Sucuri analysts have discovered a massive hacking campaign in which…

scan all devices in the country

British Experts Scan All Devices in the Country Looking for Vulnerabilities

The UK’s National Cyber Security Center (NCSC) said its experts…

Yanluowang hacker group

Logs of Internal Chats of the Russian Hacker Group Yanluowang Leaked to the Network

Information security experts report a hack of the Yanluowang hacker…

Malware Notebook Data

Emotet Botnet Resumed Activity after Five Months of Inactivity

The Emotet botnet resumed activity and began sending out malicious…

Critical vulnerability in OpenSSL

OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical

At the end of October, OpenSSL developers warned that the…

Azov ransomware sets up analysts and tries to show up as pro-Ukrainian

Azov Ransomware Tries to Set Up Cybersecurity Specialists

Azov ransomware, a newcomer to the encryption malware market, appears…

Raspberry Robin worm operators

Raspberry Robin Worm Operators Now Trade Access

Microsoft researchers reported that the operators of the hack group,…

critical vulnerability in OpenSSL

OpenSSL Fixes First Critical Vulnerability Since 2016

The developers of the OpenSSL project have informed users that…

hacker group Vice Society

Microsoft Links Hacker Group Vice Society to Several Ransomware Campaigns

Microsoft experts have published a report on the hacker group…

Atomic Energy Organization of Iran

Hacktivists Stole 100,000 Emails from Atomic Energy Organization of Iran

The Atomic Energy Organization of Iran (AEOI) reported that the…

AI Assistant

Hello! 👋 How can I help you today?