The Security Blog From Gridinsoft

Chrome Vulnerability Allows for RCE Exploitation

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Google released an urgent security update for its Chrome browser. The patch contains the fix for CVE-2023-4863, a heap buffer…

Spyware in Fake Telegram Apps Infected Over 10 million Users

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions…

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively…

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable…

NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers

On September 7, 2023, NCA released a statement regarding the new complex pack of sanctions against Russian Conti cybercrime group…

Threat Actors Exploit MSDT Follina Bug To Drop RAT And Infostealer

Attackers Exploit MSDT Follina Bug to Drop RAT

Security specialists caution users about the exploitation of the recently…

Cuba Flag

New Cuba Ransomware Variant Involves Double-Extortion Scheme

What’s new in April Variant of Cuba Ransomware The Cuba…

Evil Corp switched to LockBit

Evil Corp Switched to Using LockBit Malware to Avoid Sanctions

The Evil Corp group switched to using the LockBit ransomware…

Extension spoofing strikes Spanish-speaking countries

Extension spoofing strikes Spanish-speaking countries

An old-good form of malware disguisment sparked recently in several…

UNISOC vulnerability

Critical Vulnerability in UNISOC Devices Patched

UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In…

0-day vulnerability in Windows Search

Information Security Specialists Discovered a 0-day Vulnerability in Windows Search

A new 0-day Windows Search vulnerability could be used to…

Clipminer

Clipminer – a Million Dollar Clipboard Hijacking Coinminer

Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been…

YourCyanide Ransomware

CMD-Based Ransomware YourCyanide With Info-Stealing Functions

New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development,…

Follina 0-day vulnerability

Chinese Hackers Attack Fresh 0-day Follina Vulnerability

Experts have warned that Chinese hackers are already actively exploiting…

destroyed the FluBot trojan

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of…

Operation Killer Bee

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

North Africa, Southeast Asia, and Middle East oil and gas…

Moonbirds Owl Avatars

29 Moonbirds Stolen via Link Click from a Proof Collective Member

29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M)…