The Security Blog From Gridinsoft

Carbanak is Back With New Distribution Channels

Carbanak is Back with a New Spreading Tactic

The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with new ransomware tactics, marking a significant evolution in…

What are Crypto Draining Attacks? Signs & Mitigation

Among a wide variety of possible scams that involve cryptocurrencies, crypto draining attacks stand in their volume and amount of…

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a…

FalseFont Malware Targets Defence Contractors Worldwide

The Iranian hacking group APT33 has developed a new malware called FalseFont. They use it to target the Defense Industrial…

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges…

GitHub repositories spread malware

Thousands of GitHub Repositories Spread Malware That Is Disguised as Exploits

Experts from the Leiden Institute for Advanced Computer Science have…

vulnerability in Apache Commons Text

New Vulnerability in Apache Commons Text Is Already Being Attacked by Hackers

According to WordPress security firm Defiant, attempts have already been…

Ransom Cartel and REvil

Researchers Linked Ransom Cartel members to Famous Hack Group REvil

Experts from the Palo Alto Network analysed the Ransom Cartel…

New PowerShell Backdoor

New PowerShell Backdoor Masquerades as a Windows Update

Cybersecurity experts from SafeBreach have found a new, previously undocumented…

Weak block cipher

Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure

WithSecure (formerly F-Secure Business) researchers claim that the content of…

DeadBolt decryption keys

Police Swindle Decryption Keys from DeadBolt Ransomware Gang

The Dutch National Police, together with information security specialists from…

DDOSIA pays volunteers

Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies

Radware experts discovered the DDOSIA crowdsourcing DDoS project, in which…

0-day in Microsoft Exchange

Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It

Although Microsoft still hasn’t fixed the ProxyNotShell vulnerabilities found in…

Fake Adult Sites

Fake Sites for Adults Destroy User Data

Experts from the Cyble company have discovered a number of…

Meta and Chinese Apps

Meta Finds over 400 Chinese Apps That Stole Data from 1 million Users

Meta has sued several Chinese companies (including HeyMods, Highlight Mobi…

XDSpy hacker group

Hacker Group XDSpy Distributes Malware in Russia under the Guise of Subpoenas for the Army

In early October, Kaspersky Lab experts recorded a targeted attack…

Maggie backdoor in Microsoft SQL

Hundreds of Microsoft SQL Servers Infected with Maggie Backdoor

Security researchers have discovered a new malware that targets Microsoft…

AI Assistant

Hello! 👋 How can I help you today?