The Security Blog From Gridinsoft
Infostealer Malware: Top Stealers in 2024
Cybercrime world changes rapidly – both by expanding, collapsing, evolving extensively and intensively. One of the most massive malware types…
Trend Micro: Millions of Android Devices Contain Malware Right in the Firmware
Trend Micro analysts presented an interesting report at the Black Hat Asia conference: according to their information, millions of Android…
RedLine Stealer Issues 100,000 Samples – What is Happening?
Throughout the entire early May 2023, GridinSoft analysts team observed an anomalous activity of RedLine stealer. It is, actually, an…
Western Digital Admits that Users’ Personal Data Was Compromised in the Company’s Hack
Western Digital, which was hit by a BlackCat hack in March 2023, has finally admitted that customers’ personal data was…
Fake Windows Update in Browser Deliver Aurora Stealer
Fake Windows Update became a malware spreading way once again. Updates are a pretty routine part of the Windows user…
Users can be lured to a malicious site through a vulnerability in Apple AirTag
Security researcher Bobby Rauch discovered a vulnerability in AirTag key fobs, which Apple advertises as a convenient solution for tracking personal belongings (for example, laptops, phones, car keys, backpacks, and…
Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card
Scientists talked about how to make fraudulent payments using Apple Pay with a Visa card on a locked iPhone. This scam works over the air, even if the iPhone is…
The head of the Group-IB arrested, searches were carried out in the company’s office
Today, September 29, 2021, the media reported that yesterday the founder and head of the Russian Internet security company Group-IB, Ilya Sachkov, was arrested for two months on suspicion of…
New feature in Exchange Server will apply fixes automatically
Microsoft has added a new feature to Exchange Server that will automatically take action to remediate high-risk vulnerabilities (most likely already exploited by hackers). This should protect Exchange servers from…
Google developers told how they will implement Manifest V3
This week, Google developers shared their plans to bring the infamous Manifest V3 to full functionality, which became available in the beta version of Chrome 88. Let me remind you…
Hack group REvil deceived their partners due to a backdoor
The researchers found that the creators of REvil deceived their partners using a scheme that allowed them to decrypt any systems blocked by the ransomware and take the entire ransom…
FBI Kept Secret Key To Decrypt Data After REvil Attacks
Journalists of The Washington Post found out how the FBI obtained the key to decrypt the data, which was affected in the attacks of the REvil ransomware. First, should be…
BlackMatter ransomware attacked American farmers from NEW Cooperative
The BlackMatter ransomware attacked the American farmers organization NEW Cooperative, which produces feed and grain, as well as works in the fields of agronomy, energy and software for farmers. The…
Epik hoster hack affected 15 million users, not just the company’s clients
Last week, Anonymous hacktivists reported about hack of the database of the domain registrar and hoster Epik, which was previously often criticized for hosting “right-wing” sites including 8chan, Gab, Parler…
Added utility for decrypting data after REvil attacks
The Romanian company Bitdefender has published a universal utility for decrypting data affected by REvil (Sodinokibi) ransomware attacks. The tool works for any data encrypted before July 13, 2021. However,…
Anonymous hacktivists attacked the Epik hoster with the right-wing radical sites
Anonymous hacktivists attacked into the database of the domain registrar and hoster Epik, which was previously often criticized for hosting right-wing sites including 8chan, Gab, Parler and The Donald. The…
SpookJS Attack Allows to Bypass Site Isolation In Google Chrome
A group of scientists from universities in Australia, Israel and the United States have presented a side-channel attack that allows recovering data from Google Chrome and Chromium-based browsers protected by…