The Security Blog From Gridinsoft

7 Most Common Types of Malware Explained

Seven Common Types of Malware – Analysis & Description

In the intricate landscape of cybersecurity, comprehending the various forms of malware is crucial. This article offers an in-depth look…

DLL Search Order Hijacking Technique Bypasses Protection

A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This method capitalizes on executables in the trusted WinSxS…

Microsoft Disables MSIX App Installer Protocol

Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation in real-world cyberattacks. Hackers found a way to…

Novice Rugmi Loader Delivers Various Spyware

The threat landscape meets a new player – Rugmi Loader. This threat specializes in spreading spyware, and is in fact…

Xamalicious Trojan Hits Over 327K Android Devices

A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at the edge of 2023. This malware exhibits potent…

Lazarus attack macOS users

Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com

Sentinel One has discovered that the North Korean hacker group…

Ukrainian law enforcers arrested

Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts

Ukrainian law enforcers reported that they “neutralized” and arrested hackers…

fake dating site

Scammers Use Fake Dating Sites to Steal Money

Experts from ReasonLabs have discovered an unusual malicious scheme that…

fake notifications from CircleCI

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub warns that a large-scale phishing campaign aimed at users…

LockBit 3.0 Builder

LockBit 3.0 Builder leaked to the public

On September 21, 2022, a new Twitter user Ali Qushji…

Gamaredon Hack Group

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon…

keyloggers in phishing pages

Attackers Began to Embed Keyloggers in Phishing Pages

Analysts from the Cyble company recorded an interesting phishing campaign…

Lorenz and Mitel ransomware

Lorenz Ransomware Penetrates Company Networks through Mitel VoIP Products

Security firm Arctic Wolf has warned that Lorenz ransomware is…

data stolen from Cisco

Ransomware publishes data stolen from Cisco

The Yanluowang hack group published data stolen from Cisco back…

0-day vulnerability in WordPress

0-day Vulnerability in WordPress BackupBuddy Plugin Attacked Over 5 million Times

Wordfence analysts have discovered that a fresh 0-day vulnerability in…

North Korean Group Lazarus

North Korean Group Lazarus Attacks Energy Companies

A new malware campaign by the North Korean hacker group…

MooBot attacks D-Link routers

MooBot Botnet Attacks D-Link Routers

Experts have discovered that the MooBot botnet, built on the…

AI Assistant

Hello! 👋 How can I help you today?