The Security Blog From Gridinsoft

Boeing data breach

LockBit Ransomware Exposes Boeing’s 50GB of Data Leaked

In a cybersecurity nightmare, Boeing, a global aerospace and defense titan, has fallen victim to the notorious LockBit ransomware group.…

SLP DDoS Amplification Vulnerability Actively Exploited

In a recent development, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has raised alarms over an actively exploited high-severity…

SecuriDropper Bypasses Google Play & Android Defenses

SecuriDropper is a rare example of the Android dropper malware that operates under the dropper-as-a-service (DaaS) model. This malware is…

North Korean Hackers Force US, Japan & South Korea Consultations

Increased activity by North Korean state hackers forced South Korea, the United States and Japan to create a special advisory…

Socks5Systemz Proxy Service Infects 10,000 Systems Worldwide

A proxy botnet, “Socks5Systemz”, uses malware loaders to infiltrate computers across the globe. Attackers have infected about 10,000 devices and…

Follina in Microsoft Office

Attackers Are Already Exploiting the Fresh 0-day Follina Bug in Microsoft Office

Security researchers recently discovered a zero-day vulnerability in Microsoft Office…

An image of a hacker

A WSO2 Vulnerability is Fraught with Remote Code Execution

The products by WSO2, an open-source API, applications, and web…

Vulnerabilities in preinstalled Android apps

Microsoft Experts Found Vulnerabilities in Pre-Installed Android Applications

Microsoft experts have found four serious vulnerabilities in pre-installed Android…

Google Global Cache in Russia

Google Has Disabled Some of the Global Cache Servers in Russia

Media reports say that Google is notifying ISPs in Russia…

Cobalt Strike beacons

Fake Exploits Used to Deliver Cobalt Strike Beacons

Cyble experts have warned that cybercriminals are attacking IS researchers,…

Conti ceases operations

The Conti Ransomware Ceases Operations and Breaks Up into Several Groups

Experts report that the Conti ransomware is going out of…

Wizard Spider Group

Cybersecurity Experts Analyzed the Methods of a Group of Russian Hackers Wizard Spider

Information security specialists from PRODAFT have published the results of…

steal a Tesla car

Information Security Specialist Showed How to Steal a Tesla Car

Sultan Qasim Khan, a security consultant of the NCC Group,…

PowerShell RAT malware

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in…

Microsoft and the PetitPotam Attacks

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

In May, Microsoft released a security update, as it had…

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit attacks the Canadian defensive co. Top Aces inc

Canadian defense contractor Top Aces Inc became the victim of…

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Following recent fixes for a large number of UEFI vulnerabilities,…

AI Assistant

Hello! 👋 How can I help you today?