The Security Blog From Gridinsoft

SapphireStealer Review and Analysis

SapphireStealer: Stealthiness, Flexibility and Malware Delivery

SapphireStealer is one such new information stealer to steal various browser credential databases and files containing users’ sensitive information. The…

DarkGate Loader Expands Activity, Delivers Ransomware

A new DarkGate malware deployment campaign has caught the attention of cybersecurity researchers. This was fueled by the developer’s decision…

Qakbot Botnet Hacked, Removed from Over 700,000 Machines

Qakbot, a notorious botnet, has been taken down by a multinational law enforcement operation spearheaded by the FBI, Operation “Duck…

Wilko Stock Liquidation Scams – Fake Shopping Sites

Recent events around the Wilko retail chain are sad for its customers, but may also expose folks to financial dangers.…

Botnet of 400,000 Devices Used as Proxy Nodes Uncovered

Cybercriminals used stealthy malware to create a botnet of 400,000 proxy servers. Although the company providing the proxy services claims…

New BHUNT malware

New BHUNT malware hunts for cryptocurrency wallets

Bitdefender researchers talked about a new modular BHUNT malware that…

remove google analytics

Companies in the EU will have to remove Google Analytics from their websites

Companies in the European Union will have to remove Google…

hack group Earth Lusca

Cybersecurity researchers discovered Chinese hack group Earth Lusca

According to a Trend Micro report, the Chinese cyber-espionage hack…

The Facebook Pixel Hunt

The Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with…

WhisperGate wiper

Microsoft discovered the WhisperGate wiper attacking Ukrainian users

Microsoft says it discovered a destructive attack on Ukrainian users…

hackers defaced government websites

Most likely russian hackers defaced Ukrainian government websites

Hackers defaced several Ukrainian government websites: the attack occurred on…

remote access to Tesla cars

Teen gets remote access to 25 Tesla cars

19-year-old David Colombo said on Twitter that he gets remote…

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

Aquatic Panda exploits Log4Shell

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury…

AI Assistant

Hello! 👋 How can I help you today?