The Security Blog From Gridinsoft

Cryptocurrency Scams Aim Hot and Cold Wallets At Once

Hot and Cold Crypto Wallets Hacking

Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers…

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear…

Legion Stealer targeting PUBG players

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise…

MOVEit Transfer Fixes a New Critical Vulnerability

After hundreds of companies were attacked with a 0-day vulnerability in MOVEit Transfer, the developer of this file transfer management…

California Water Treatment Plant Is in the Hands of a Hacker

Rambler Gallo, a resident of Tracy, Calif., has been charged with maliciously damaging a computer after it allegedly infiltrated a…

members of the hacker group Phoenix

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of…

published an exploit for Windows

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Bleeping Computer reported that cybersecurity researcher has published an exploit…

smartphones to find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

A team of researchers from the National University of Singapore…

exploits as a service on the darknet

Researchers noticed that the darknet is discussing exploits as a service

Analysts at Digital Shadows have prepared a report on the…

Rowhammer attack on DDR4 memory

New Rowhammer Attack Breaks DDR4 Memory Protection

Researchers have unveiled a new fuzzing attack technique, Blacksmith, which…

FBI mail server

Hackers broke into FBI mail server and sent fake cyberattack alerts

Last weekend, unknown hackers managed to break into the mail…

Clop exploits a vulnerability in SolarWinds

Clop ransomware exploits vulnerability in SolarWinds Serv-U

The NCC Group warns of a spike of Clop ransomware…

NUCLEUS: 13 Problems

NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems

Forescout and Medigate Labs issued a report on NUCLEUS:13 problems…

arrest a Kaseya hacker

US authorities arrest Kaseya hacker and attacker associated with REvil and GandCrab

Law enforcement agencies, as well as European and American authorities,…

information about DarkSide operators

US authorities offer $10 million for information on DarkSide operators

The US government has offered a $10,000,000 reward for any…

Trojan Source Attack

Trojan Source attack is dangerous for compilers of most programming languages

Scientists at the University of Cambridge, Ross Anderson and Nicholas…

termination of BlackMatter

Operators of the BlackMatter ransomware announced the termination of activity

The hackers behind the BlackMatter ransomware the termination of activity…