The Security Blog From Gridinsoft

"Ethyrial: Echoes of Yore" Game Fell Victim to Ransomware Attack

Ethyrial: Echoes of Yore Ransomware Attack Wiped Player Accounts

“Ethyrial: Echoes of Yore” fell victim to a ransomware attack last Friday. The attack hit 17,000 player accounts, wiping them…

Dharma Ransomware Criminals Captured in Ukraine, Europol Reports

On November 28, 2023, Europol claimed successful detainment of ransomware operators, particularly related to Dharma and Hive ransomware. The operation…

InfectedSlurs Botnet Exploits Zero-Days to Spread Mirai Malware

The “InfectedSlurs Botnet,” a sophisticated cyber threat, has been uncovered by the Akamai SIRT in a recent development. This malware…

DarkGate and Pikabot Copy the QakBot Malware

According to researchers, the phishing campaign promoting the DarkGate and PikaBot malware is carried out by the authors or successors…

Phobos Ransomware Mimics VX-Underground Researchers

A new version of Phobos ransomware claims to be developed by VX-Underground, a malware info sharing community. Hackers again disguise…

LockBit 3.0 Builder

Hackers Launched LockBit 3.0 and Bug Bounty Ransomware

The LockBit ransomware group released the LockBit 3.0 malware, at…

LockBit 2.0 Logo

LockBit Weaponizes Its Victims’ Clients – Brett Callow

Brett Callow, a cybersecurity analyst at Emsisoft, shared information on…

Microsoft Edge WebView2

Phishers Can Bypass Multi-Factor Authentication with Microsoft Edge WebView2

An information security expert known as mr.d0x has developed a…

decryptor for Lorenz ransomware

Conti vs. LockBit 2.0 – a Trend Micro Research in Brief

Trend Micro, a Japanese IT security company, has published a…

Conti Ransomware Shutdown, Site Disabled

Conti Ransomware Shutdown, Site Disabled

Conti operators shut down the remnants of the public infrastructure.…

New Way to Cheat Ransomware Victims into Opening Infected Emails

Copyright Claims Used as Bait by LockBit 2.0 Affiliates in Korea

A new type of email-bait has been invented by the…

NCC Group Threat Pulse May

NCC Group’s May 2022 Threat Report Reflects Conti’s End

NCC Group’s monthly report on cyber threats features some curious…

CAPTCHA WINDOW

Privacy Access Tokens to Replace CAPTCHA Real Soon

CAPTCHA, a well-known test for website visitors to prove they…

Chinese hackers and espionage

Chinese Hackers Use Ransomware As a Cover for Espionage

Secureworks experts have found that Chinese hackers from two groups…

Mobile Spyware

Google Report Companies Creating Mobile Spyware for Governments

Google Reveals An Italian Company to Sell Android and iOS…

Microsoft accuses Russia

Microsoft Accuses Russia of Cyberattacks against Ukraine’s Allies

In the latest report on global information security, Microsoft accuses…

WiFi

WiFi-Hacking by Neighbours is Rampant in the UK, Research Says

WiFi-Hacking by Neighbors is Rampant in the UK, Research Says…

AI Assistant

Hello! 👋 How can I help you today?