The Security Blog From Gridinsoft

Outlook Vulnerability Exploited In The Wild

Outlook Vulnerability Exploited by Russian Hackers

A vulnerability in Microsoft Outlook is under active exploitation – that is the worrying notification from Microsoft. World largest software…

Qilin Ransomware Focuses on VMware ESXi Servers

In a disturbing development, security researchers have uncovered a Linux version of the Qilin ransomware gang’s encryptor, specifically tailored to…

Google Addresses Zero-Day Vulnerability in Chrome

In a recent security alert, Google has addressed a critical zero-day vulnerability in its Chrome browser and ChromeOS software, urging…

Tipalti, Roblox and Twitch Hacked by ALPHV/BlackCat

On December 3, 2023, ALPHV ransomware gang claimed hacking into a fintech software provider Tipalti, Roblox and Twitch, its clients.…

SugarGh0st RAT Targets Uzbekistan and South Korea

A new malicious campaign employs SugarGh0st RAT to target government agencies. Artifacts in the decoy documents hint at a potential…

keyloggers in phishing pages

Attackers Began to Embed Keyloggers in Phishing Pages

Analysts from the Cyble company recorded an interesting phishing campaign…

Lorenz and Mitel ransomware

Lorenz Ransomware Penetrates Company Networks through Mitel VoIP Products

Security firm Arctic Wolf has warned that Lorenz ransomware is…

data stolen from Cisco

Ransomware publishes data stolen from Cisco

The Yanluowang hack group published data stolen from Cisco back…

0-day vulnerability in WordPress

0-day Vulnerability in WordPress BackupBuddy Plugin Attacked Over 5 million Times

Wordfence analysts have discovered that a fresh 0-day vulnerability in…

North Korean Group Lazarus

North Korean Group Lazarus Attacks Energy Companies

A new malware campaign by the North Korean hacker group…

MooBot attacks D-Link routers

MooBot Botnet Attacks D-Link Routers

Experts have discovered that the MooBot botnet, built on the…

New Shikitega Malware

The New Shikitega Malware Is Very Difficult to Detect and Eliminate

AT&T researchers have discovered a new Linux stealth malware called…

SharkBot on the Google Play Store

SharkBot Malware Infiltrates Google Play Store Again

Information security specialists from Fox IT discovered two applications in…

CodeRAT Source code

Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has…

Cisco Hacking

Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp

Experts from eSentire established that the infrastructure used to hack…

use of floppy disks in Japan

The Japanese Government Decided to Fight the Use of … Floppy Disks

As it turns out, more than 1,900 administrative procedures in…

Malware in James Webb pictures

Malware Hides in Images from the James Webb Telescope

Securonix researchers have noticed an interesting malware campaign that distributes…

AI Assistant

Hello! 👋 How can I help you today?