The Security Blog From Gridinsoft

Frauds Exploit Twitter's Feature to Promote Cryptoscams

Cryptocurrency Scams on Twitter Exploit Post Features

Fraudsters are seen to exploit a feature of Twitter publications, misleading users and endangering digital assets. This deceptive strategy hinges…

What are Remote Encryption Attacks? Explanation & Mitigation

The digital world is seeing a surge in remote encryption attacks – a sophisticated ransomware attack. Although there is nothing…

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

Comcast confirms a massive security breach impacting its Xfinity division. Nearly 36 million customers of the world’s largest telecom provider…

Mr. Cooper’s Data Breach Affects Millions

Hackers have infiltrated the secure databases of Mr. Cooper, a prominent mortgage and loan company, resulting in a massive data…

ALPHV Site Taken Down by the FBI

On December 19, 2023, one of the ALPHV/BlackCat ransomware sites was taken down by the FBI. The typical FBI banner…

fake notifications from CircleCI

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub warns that a large-scale phishing campaign aimed at users…

LockBit 3.0 Builder

LockBit 3.0 Builder leaked to the public

On September 21, 2022, a new Twitter user Ali Qushji…

Gamaredon Hack Group

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon…

keyloggers in phishing pages

Attackers Began to Embed Keyloggers in Phishing Pages

Analysts from the Cyble company recorded an interesting phishing campaign…

Lorenz and Mitel ransomware

Lorenz Ransomware Penetrates Company Networks through Mitel VoIP Products

Security firm Arctic Wolf has warned that Lorenz ransomware is…

data stolen from Cisco

Ransomware publishes data stolen from Cisco

The Yanluowang hack group published data stolen from Cisco back…

0-day vulnerability in WordPress

0-day Vulnerability in WordPress BackupBuddy Plugin Attacked Over 5 million Times

Wordfence analysts have discovered that a fresh 0-day vulnerability in…

North Korean Group Lazarus

North Korean Group Lazarus Attacks Energy Companies

A new malware campaign by the North Korean hacker group…

MooBot attacks D-Link routers

MooBot Botnet Attacks D-Link Routers

Experts have discovered that the MooBot botnet, built on the…

New Shikitega Malware

The New Shikitega Malware Is Very Difficult to Detect and Eliminate

AT&T researchers have discovered a new Linux stealth malware called…

SharkBot on the Google Play Store

SharkBot Malware Infiltrates Google Play Store Again

Information security specialists from Fox IT discovered two applications in…

CodeRAT Source code

Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has…

AI Assistant

Hello! 👋 How can I help you today?