The Security Blog From Gridinsoft

IPStorm Botnet Stopped by FBI, Key Operator Detained

IPStorm Botnet Stopped by the FBI, Operator Detained

The FBI has successfully dismantled the notorious IPStorm botnet and apprehended its operator. The operation took place back in September,…

Plume Hacked, Data Leaked in the Darknet

An anonymous hacker posted about a Plume data breach on the Darknet. The hacker says they have stolen the personal…

Reptar Vulnerability Threatens Intel Processors

Intel has fixed a serious Reptar vulnerability in various processors for desktops, servers, mobile devices and embedded systems. This has…

Moneris Hacked, Medusa Ransomware Claims

Canadian fintech giant Moneris has been claimed to have been hacked by the notorious Medusa ransomware group. It sends shockwaves…

Malicious CPU-Z Copy Is Spread In Google Search Ads

Attackers are again abusing the Google Ads platform to distribute malicious advertising and Redline information stealer. This time, the ads…

YourCyanide Ransomware

CMD-Based Ransomware YourCyanide With Info-Stealing Functions

New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development,…

Follina 0-day vulnerability

Chinese Hackers Attack Fresh 0-day Follina Vulnerability

Experts have warned that Chinese hackers are already actively exploiting…

destroyed the FluBot trojan

Europol and Intelligence Agencies of 11 Countries Destroyed the FluBot Trojan Infrastructure

Europol announced that law enforcement officers, as a result of…

Operation Killer Bee

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

North Africa, Southeast Asia, and Middle East oil and gas…

Moonbirds Owl Avatars

29 Moonbirds Stolen via Link Click from a Proof Collective Member

29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M)…

Follina in Microsoft Office

Attackers Are Already Exploiting the Fresh 0-day Follina Bug in Microsoft Office

Security researchers recently discovered a zero-day vulnerability in Microsoft Office…

An image of a hacker

A WSO2 Vulnerability is Fraught with Remote Code Execution

The products by WSO2, an open-source API, applications, and web…

Vulnerabilities in preinstalled Android apps

Microsoft Experts Found Vulnerabilities in Pre-Installed Android Applications

Microsoft experts have found four serious vulnerabilities in pre-installed Android…

Google Global Cache in Russia

Google Has Disabled Some of the Global Cache Servers in Russia

Media reports say that Google is notifying ISPs in Russia…

Cobalt Strike beacons

Fake Exploits Used to Deliver Cobalt Strike Beacons

Cyble experts have warned that cybercriminals are attacking IS researchers,…

Conti ceases operations

The Conti Ransomware Ceases Operations and Breaks Up into Several Groups

Experts report that the Conti ransomware is going out of…

Wizard Spider Group

Cybersecurity Experts Analyzed the Methods of a Group of Russian Hackers Wizard Spider

Information security specialists from PRODAFT have published the results of…

AI Assistant

Hello! 👋 How can I help you today?