The Security Blog From Gridinsoft

Reptar Vulnerability in Intel Allows to Escalate Privileges

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors for desktops, servers, mobile devices and embedded systems. This has…

Moneris Hacked, Medusa Ransomware Claims

Canadian fintech giant Moneris has been claimed to have been hacked by the notorious Medusa ransomware group. It sends shockwaves…

Malicious CPU-Z Copy Is Spread In Google Search Ads

Attackers are again abusing the Google Ads platform to distribute malicious advertising and Redline information stealer. This time, the ads…

LockBit Ransomware Exposes Boeing’s 50GB of Data Leaked

In a cybersecurity nightmare, Boeing, a global aerospace and defense titan, has fallen victim to the notorious LockBit ransomware group.…

SLP DDoS Amplification Vulnerability Actively Exploited

In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised alarms over an actively exploited high-severity…

Linux malware Symbiote

Information Security Experts Told About The Linux Malware Symbiote That Is Almost Undetectable

BlackBerry and Intezer specialists spoke about the new Symbiote Linux…

SSNDOB seized

Joint Operation: SSNDOB Personal Data Darknet Market Seized

What SSNDOB Was Before Its Servers Were Seized The US…

SpaceX Bitcoin Fake

Beware: New SpaceX Bitcoin Giveaway Scam

Crooks Make Elon Musk a Bait for Wannabe Cryptotraders Scammers…

Disclaimer LockBit 2.0

LockBit 2.0 Promises to Leak Mandiant Data

LockBit 2.0 announcement: real thing or vengeful trolling? On June…

Microsoft is in no hurry to fix Follina

Microsoft Is in No Hurry to Fix the Follina Vulnerability, Which Has Become a Real Disaster

Hackers are actively exploiting the critical 0-day Follina vulnerability, which…

Threat Actors Exploit MSDT Follina Bug To Drop RAT And Infostealer

Attackers Exploit MSDT Follina Bug to Drop RAT

Security specialists caution users about the exploitation of the recently…

Cuba Flag

New Cuba Ransomware Variant Involves Double-Extortion Scheme

What’s new in April Variant of Cuba Ransomware The Cuba…

Evil Corp switched to LockBit

Evil Corp Switched to Using LockBit Malware to Avoid Sanctions

The Evil Corp group switched to using the LockBit ransomware…

Extension spoofing strikes Spanish-speaking countries

Extension spoofing strikes Spanish-speaking countries

An old-good form of malware disguisment sparked recently in several…

UNISOC vulnerability

Critical Vulnerability in UNISOC Devices Patched

UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In…

0-day vulnerability in Windows Search

Information Security Specialists Discovered a 0-day Vulnerability in Windows Search

A new 0-day Windows Search vulnerability could be used to…

Clipminer

Clipminer – a Million Dollar Clipboard Hijacking Coinminer

Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been…

AI Assistant

Hello! 👋 How can I help you today?