The Security Blog From Gridinsoft

What is ChatGPT Fleeceware?

ChatGPT Causes New Wave of Fleeceware

Artificial intelligence is one of the most significant advances in technology. It is used in one way or another everywhere,…

PyPI Malware Storm Forces to Suspend New Uploads

Python Package Index, a software repository for Python developers, recently faced a massive attack. An enormous flow of malicious uploads…

3 Unpopular Malware Spreading Ways in 2023

The modern Internet space is like an endless ocean, where every wave can hide a danger. If you think you…

Visual Studio Code Malicious Plugins Steal Personal Data

Some plugins for Visual Studio Code, a popular code editing tool developed by Microsoft, appear to have malicious code. In…

Infostealer Malware: Top Stealers in 2024

Cybercrime world changes rapidly – both by expanding, collapsing, evolving extensively and intensively. One of the most massive malware types…

vulnerability in Surface Pro 3

Microsoft warns of dangerous vulnerability in Surface Pro 3 devices

Microsoft engineers have published a security bulletin on a new vulnerability affecting Surface Pro 3 tablets. The bug could be used by an attacker to inject malicious devices into corporate…

95% of ransomware target Windows

VirusTotal said that almost 95% of ransomware target Windows

VirusTotal specialists presented a large report on the recent ransomware activity and said that almost 95% of ransomware targets Windows. To do this, experts analyzed 80 million samples of ransomware.…

decryptor for BlackByte ransomware

Free decryptor for BlackByte ransomware published

Experts from Trustwave have released a free decryptor utility for victims of the BlackByte ransomware that they can use to recover damaged files. The decryptor already available on GitHub works…

REvil stopped working again

REvil ransomware stopped working again, now after hacking sites

The REvil encryptor stopped working again – all operations were stopped, as an unknown person hacked the group’s website, through which hackers accepted payments from victims and “leaked” data stolen…

block access to pirated sites

VPN hosting provider agrees to block access to pirated sites

Hosting provider Sharktech has settled a copyright infringement lawsuit filed by several film companies and agreed to block access to pirated sites. The companies accused the service of not taking…

Microsoft fixes 81 bugs

Microsoft fixes 81 bugs, including vulnerability under attacks

Microsoft has released updates for its products: in total, this month the company fixed 74 bugs (81 if to include vulnerabilities in Microsoft Edge), three of which are classified as…

ALPACA use wildcard certificates

NSA warns of ALPACA attacks that use wildcard certificates

The US National Security Agency issued a security bulletin warning companies not to use wildcard TLS certificates due to their insecurity and the ALPACA TLS attacks. Let me remind you…

Facebook account of USS Kidd

Unknown hacked Facebook account of USS Kidd and streamed Age of Empires

Earlier this week, an unknown person hacked into the Facebook account of the American destroyer USS Kidd. On the compromised page, the hacker streamed for several hours how he played…

Experts discovered a UEFI bootkit

Experts discovered ESPecter UEFI bootkit used for espionage

ESET experts discovered the previously unknown ESPecter UEFI bootkit, which was used for targeted attacks and espionage. So far, experts do not associate ESPecter with any specific hack groups or…

Facebook explained reasons for the failure

Facebook explained reasons for the global failure

Yesterday, Facebook, Instagram and WhatsApp did not work for more than five hours around the world and after fixing the problems, representatives of the social network explained the reasons for…

Cyber Police and ransomware operators

Ukrainian cyber police arrested ransomware operators who “earned” $150 million

Ukrainian Cyber Police have arrested two operators of an unnamed ransomware. It is reported that the operation was carried out jointly by the Ukrainian and French police, the FBI, Europol…

Apple AirTag vulnerability

Users can be lured to a malicious site through a vulnerability in Apple AirTag

Security researcher Bobby Rauch discovered a vulnerability in AirTag key fobs, which Apple advertises as a convenient solution for tracking personal belongings (for example, laptops, phones, car keys, backpacks, and…