The Security Blog From Gridinsoft
ChatGPT Causes New Wave of Fleeceware
Artificial intelligence is one of the most significant advances in technology. It is used in one way or another everywhere,…
PyPI Malware Storm Forces to Suspend New Uploads
Python Package Index, a software repository for Python developers, recently faced a massive attack. An enormous flow of malicious uploads…
3 Unpopular Malware Spreading Ways in 2023
The modern Internet space is like an endless ocean, where every wave can hide a danger. If you think you…
Visual Studio Code Malicious Plugins Steal Personal Data
Some plugins for Visual Studio Code, a popular code editing tool developed by Microsoft, appear to have malicious code. In…
Infostealer Malware: Top Stealers in 2024
Cybercrime world changes rapidly – both by expanding, collapsing, evolving extensively and intensively. One of the most massive malware types…
Microsoft warns of dangerous vulnerability in Surface Pro 3 devices
Microsoft engineers have published a security bulletin on a new vulnerability affecting Surface Pro 3 tablets. The bug could be used by an attacker to inject malicious devices into corporate…
VirusTotal said that almost 95% of ransomware target Windows
VirusTotal specialists presented a large report on the recent ransomware activity and said that almost 95% of ransomware targets Windows. To do this, experts analyzed 80 million samples of ransomware.…
Free decryptor for BlackByte ransomware published
Experts from Trustwave have released a free decryptor utility for victims of the BlackByte ransomware that they can use to recover damaged files. The decryptor already available on GitHub works…
REvil ransomware stopped working again, now after hacking sites
The REvil encryptor stopped working again – all operations were stopped, as an unknown person hacked the group’s website, through which hackers accepted payments from victims and “leaked” data stolen…
VPN hosting provider agrees to block access to pirated sites
Hosting provider Sharktech has settled a copyright infringement lawsuit filed by several film companies and agreed to block access to pirated sites. The companies accused the service of not taking…
Microsoft fixes 81 bugs, including vulnerability under attacks
Microsoft has released updates for its products: in total, this month the company fixed 74 bugs (81 if to include vulnerabilities in Microsoft Edge), three of which are classified as…
NSA warns of ALPACA attacks that use wildcard certificates
The US National Security Agency issued a security bulletin warning companies not to use wildcard TLS certificates due to their insecurity and the ALPACA TLS attacks. Let me remind you…
Unknown hacked Facebook account of USS Kidd and streamed Age of Empires
Earlier this week, an unknown person hacked into the Facebook account of the American destroyer USS Kidd. On the compromised page, the hacker streamed for several hours how he played…
Experts discovered ESPecter UEFI bootkit used for espionage
ESET experts discovered the previously unknown ESPecter UEFI bootkit, which was used for targeted attacks and espionage. So far, experts do not associate ESPecter with any specific hack groups or…
Facebook explained reasons for the global failure
Yesterday, Facebook, Instagram and WhatsApp did not work for more than five hours around the world and after fixing the problems, representatives of the social network explained the reasons for…
Ukrainian cyber police arrested ransomware operators who “earned” $150 million
Ukrainian Cyber Police have arrested two operators of an unnamed ransomware. It is reported that the operation was carried out jointly by the Ukrainian and French police, the FBI, Europol…
Users can be lured to a malicious site through a vulnerability in Apple AirTag
Security researcher Bobby Rauch discovered a vulnerability in AirTag key fobs, which Apple advertises as a convenient solution for tracking personal belongings (for example, laptops, phones, car keys, backpacks, and…