The Security Blog From Gridinsoft

Kaspersky and WeChat Bans in Canada

WeChat and Kaspersky Ban in Canada – What You Should Know?

The Canadian government has instituted a ban on the use of WeChat and Kaspersky applications on government-issued mobile devices, effective…

New Confluence Vulnerability Leads to Unauthorised Access

Another vulnerability in the flagship product of Atlassian corporation, Confluence, allows hackers to access the servers and dump the data.…

Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?

Octo Tempest, a financially-motivated hacking group, has been labeled “one of the most dangerous financial criminal groups” by Microsoft. Known…

IoT Malware Attacks Grow by 400% in 2023

IoT malware has been a major concern over the last decade. However, trends show that things are turning even worse…

Halloween Shopping Scams — Ways to Detect & Avoid

2023 Halloween, similarly to other holidays and events of this year, will likely become a topic of a huge number…

steal a Tesla car

Information Security Specialist Showed How to Steal a Tesla Car

Sultan Qasim Khan, a security consultant of the NCC Group,…

PowerShell RAT malware

Germans Interested in the Situation in Ukraine Are Attacked by the PowerShell RAT Malware

An unknown hacker attacked German users who are interested in…

Microsoft and the PetitPotam Attacks

Microsoft Has Not Fully Coped with PetitPotam Attacks in Windows NTLM Relay

In May, Microsoft released a security update, as it had…

LockBit attacks the Canadian defensive co. Top Aces inc

LockBit attacks the Canadian defensive co. Top Aces inc

Canadian defense contractor Top Aces Inc became the victim of…

Vulnerability in HP BIOS causes system takeover

Vulnerability in HP BIOS causes system takeover

Following recent fixes for a large number of UEFI vulnerabilities,…

Vulnerability in ransomware can prevent the encryption

Vulnerabilities Allow Hijacking of Most Ransomware to Prevent File Encryption

Not a long time ago, a cybersecurity analyst posted a…

A DNS vulnerability jeopardizes IoT devices

A DNS vulnerability in uClibc/uClibs-ng libraries jeopardizes IoT devices

A vulnerability has been discovered (CVE not yet issued) in…

F5 warns of critical BIG-IP RCE vulnerability

F5 warns of critical BIG-IP RCE vulnerability

F5, Inc warned the users about the critical vulnerability that…

Experts analysed the conversation of Conti and Hive ransomware groups

Experts analysed the conversations of Conti and Hive ransomware groups

Analysis of more than 40 chats with victims allowed the…

Ukraine hit by DDoS attacks

Ukraine Was Hit by DDoS Attacks from Hacked WordPress Sites

Ukrainian Computer Emergency Response Team (CERT-UA) said that Ukraine was…

mustang panda cyberspies

Stabbed in the back: Chinese Mustang Panda Cyberspies Attack Russian Officials

Secureworks researchers have discovered a phishing campaign by Chinese Mustang…

Cybersecurity Threats

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than…

AI Assistant

Hello! 👋 How can I help you today?