The Security Blog From Gridinsoft

Aurora Stealer Spreads via Fake Windows Update

Fake Windows Update in Browser Deliver Aurora Stealer

Fake Windows Update became a malware spreading way once again. Updates are a pretty routine part of the Windows user…

The FBI Disrupted the Cyberspyware “Snake” that the Russian FSB Used for 20 Years

The US Federal Bureau of Investigation on Tuesday reported the disruption of a massive spying program by the Russian Federal…

Fullerton India Hacked, LockBit Leaks 600GB of Data

Fullerton India, a large lending institution from India, appears to be hacked back in early April 2023. It is confirmed…

Ransomware Attacks Increasingly Using AuKill Malware to Disable EDR

A new cybercrime tool called “AuKill” has emerged, which attackers use to disable endpoint detection and response (EDR) defenses used…

AI Generated Video Based on Mouse Brain Signals

A team of researchers from the EPFL has developed an AI tool that can interpret rodent brain signals in real…

Razer Synapse vulnerability

Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges

A security researcher known as jonhat discovered a 0-day vulnerability in Razer Synapse, thanks to which user can gain Windows administrator rights by simply connecting a Razer mouse or keyboard…

Hacked the US Census Bureau

Attackers hacked the US Census Bureau using Citrix exploit

The Office of the Inspector General (OIG) reported that unknown attackers hacked the servers of the US Census Bureau on January 11, 2020. To do this, a zero-day Citrix ADC…

Vulnerabilities in STARTTLS

Vulnerabilities in STARTTLS threaten popular email clients

At the USENIX conference, a group of German scientists announced the discovery of more than 40 vulnerabilities in STARTTLS implementations in popular mail clients and servers, including Apple Mail, Gmail,…

List of suspects in terrorism

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list has Leaked to the network. It is a list of suspects in terrorism that are monitored by FBI. The database…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities, and installing backdoors on them for subsequent access. Let me remind you that the vulnerabilities, which are collectively…

Print Spooler Vulnerability

Microsoft Warns of New Print Spooler Vulnerability

Microsoft has released a notice of a new vulnerability in Print Spooler (CVE-2021-36958) that allows local attackers to gain system privileges on a computer. The new vulnerability is related to…

patches for 44 Microsoft vulnerabilities

Microsoft releases patches for 44 vulnerabilities, including three 0-days

As part of Patch Tuesday this week, Microsoft released patches for 44 vulnerabilities (51 including bugs in Microsoft Edge), seven of which were classified as critical, three were 0-day, and…

FlyTrap Android malware

FlyTrap Android malware compromised over 10,000 Facebook accounts

According to experts from Zimperium, Android malware FlyTrap hijacks Facebook accounts in 140 countries around the world by stealing session cookies. Worse, the researchers found that the stolen information was…

Ukrainian fighters against pirates

Ukrainian fighters against pirates asked Google to block 127.0.0.1

The TorrentFreak media reports that Vindex, Ukrainian fighters against pirates, representing the interests of TRC Ukraine, sent Google a strange request to remove content from search results. One of the…

RansomEXX attacked Gigabyte

RansomEXX ransomware attacked Gigabyte

RansomEXX ransomware operators attacked a large Taiwanese computer hardware manufacturer Gigabyte. The hackers are currently threatening to release more than 112GB of data stolen from the company if it does…

Vulnerabilities in Amazon Kindle

Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device

Check Point researchers reported that in April of this year, IT giant Amazon eliminated critical vulnerabilities in the Amazon Kindle. The problems could be used to gain full control over…

Google fired employees

Google fired dozens of employees for data abuse

The Vice Motherboard has obtained internal Google documents stating that the company has fired dozens of employees for data abuse. The documents describe investigations into cases where Google employees used…