The Security Blog From Gridinsoft

Trigona Ransomware Hacked by Ukrainian Cyber Alliance, Backups Wiped

Trigona Ransomware Hacked by Ukrainian Cyber Alliance

Trigona ransomware, a novice threat actor active since late 2022, got its servers “exfiltrated and wiped” by Ukrainian Cyber Alliance…

Exim Vulnerability Allows RCE, No Patches Available

Exim Internet Mailer, a program massively used as a basis for mailing servers, appears to have a remote code execution…

Redline and Vidar Stealers Switch to Ransomware Delivery

Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same…

TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams

Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam videos spread across the platform. Mostly, these scams…

3AM Ransomware Backs Up LockBit In Cyberattacks

Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers attempted to use it as an alternative attack…

destroyed the FluBot trojan

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of…

Operation Killer Bee

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

North Africa, Southeast Asia, and Middle East oil and gas…

Moonbirds Owl Avatars

29 Moonbirds Stolen via Link Click from a Proof Collective Member

29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M)…

Follina in Microsoft Office

Attackers Are Already Exploiting the Fresh 0-day Follina Bug in Microsoft Office

Security researchers recently discovered a zero-day vulnerability in Microsoft Office…

An image of a hacker

A WSO2 Vulnerability is Fraught with Remote Code Execution

The products by WSO2, an open-source API, applications, and web…

Vulnerabilities in preinstalled Android apps

Microsoft Experts Found Vulnerabilities in Pre-Installed Android Applications

Microsoft experts have found four serious vulnerabilities in pre-installed Android…

Google Global Cache in Russia

Google Has Disabled Some of the Global Cache Servers in Russia

Media reports say that Google is notifying ISPs in Russia…

Cobalt Strike beacons

Fake Exploits Used to Deliver Cobalt Strike Beacons

Cyble experts have warned that cybercriminals are attacking IS researchers,…

Conti ceases operations

The Conti Ransomware Ceases Operations and Breaks Up into Several Groups

Experts report that the Conti ransomware is going out of…

Wizard Spider Group

Cybersecurity Experts Analyzed the Methods of a Group of Russian Hackers Wizard Spider

Information security specialists from PRODAFT have published the results of…

steal a Tesla car

Information Security Specialist Showed How to Steal a Tesla Car

Sultan Qasim Khan, a security consultant of the NCC Group,…

PowerShell RAT malware

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in…

AI Assistant

Hello! 👋 How can I help you today?