The Security Blog From Gridinsoft

BLUFFS Vulnerabilities Make Bluetooth Devices Open to Attack

BLUFFS Bluetooth Vulnerability Threatens Billions of Devices

Eurecom has uncovered a series of exploits named “BLUFFS”, posing a significant threat to the security of Bluetooth sessions. These…

Okta Hack Exposes Data of All Support Customers

Back in mid-October 2023 Okta, one of the world’s largest identity providers, suffered a data breach. Security vulnerabilities in its…

Henry Schein was hacked twice by BlackCat ransomware

Henry Schein Global, a healthcare solutions provider, faced a persistent cybersecurity nightmare. The BlackCat/ALPHV ransomware gang is launching a second…

Ethyrial: Echoes of Yore Ransomware Attack Wiped Player Accounts

“Ethyrial: Echoes of Yore” fell victim to a ransomware attack last Friday. The attack hit 17,000 player accounts, wiping them…

Dharma Ransomware Criminals Captured in Ukraine, Europol Reports

On November 28, 2023, Europol claimed successful detainment of ransomware operators, particularly related to Dharma and Hive ransomware. The operation…

ZuoRAT trojan hacks routers

ZuoRAT Trojan Hacks Asus, Cisco, DrayTek and NETGEAR Routers

Lumen Black Lotus Labs has discovered a new Remote Access…

LockBit 3.0 Builder

Hackers Launched LockBit 3.0 and Bug Bounty Ransomware

The LockBit ransomware group released the LockBit 3.0 malware, at…

LockBit 2.0 Logo

LockBit Weaponizes Its Victims’ Clients – Brett Callow

Brett Callow, a cybersecurity analyst at Emsisoft, shared information on…

Microsoft Edge WebView2

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

An information security expert known as mr.d0x has developed a…

decryptor for Lorenz ransomware

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Trend Micro, a Japanese IT security company, has published a…

Conti Ransomware Shutdown, Site Disabled

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure.…

New Way to Cheat Ransomware Victims into Opening Infected Emails

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

A new type of email-bait has been invented by the…

NCC Group Threat Pulse May

NCC Group’s May 2022 Threat Report Reflects Conti’s End

NCC Group’s monthly report on cyber threats features some curious…

CAPTCHA WINDOW

Privacy Access Tokens to Replace CAPTCHA Real Soon

CAPTCHA, a well-known test for website visitors to prove they…

Chinese hackers and espionage

Chinese Hackers Use Ransomware As a Cover for Espionage

Secureworks experts have found that Chinese hackers from two groups…

Mobile Spyware

Google Report Companies Creating Mobile Spyware for Governments

Google Reveals An Italian Company to Sell Android and iOS…

Microsoft accuses Russia

Microsoft Accuses Russia of Cyberattacks against Ukraine’s Allies

In the latest report on global information security, Microsoft accuses…

AI Assistant

Hello! 👋 How can I help you today?