The Security Blog From Gridinsoft

3AM Ransomware Used As A Fallback For LockBit

3AM Ransomware Backs Up LockBit In Cyberattacks

Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers attempted to use it as an alternative attack…

Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild

Google released an urgent security update for its Chrome browser. The patch contains the fix for CVE-2023-4863, a heap buffer…

Spyware in Fake Telegram Apps Infected Over 10 million Users

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions…

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively…

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable…

Belarusian Cyber Partisans

Belarusian Cyber Partisans hack group attacked railway servers

A hack group that calls itself Belarusian Cyber Partisans claims…

RCE vulnerability in Dark Souls

Dark Souls 3 found an RCE vulnerability that allows taking control of someone else’s PC

Over the weekend, the developers of the Dark Souls series…

New BHUNT malware

New BHUNT malware hunts for cryptocurrency wallets

Bitdefender researchers talked about a new modular BHUNT malware that…

remove google analytics

Companies in the EU will have to remove Google Analytics from their websites

Companies in the European Union will have to remove Google…

hack group Earth Lusca

Cybersecurity researchers discovered Chinese hack group Earth Lusca

According to a Trend Micro report, the Chinese cyber-espionage hack…

The Facebook Pixel Hunt

The Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with…

WhisperGate wiper

Microsoft discovered the WhisperGate wiper attacking Ukrainian users

Microsoft says it discovered a destructive attack on Ukrainian users…

hackers defaced government websites

Most likely russian hackers defaced Ukrainian government websites

Hackers defaced several Ukrainian government websites: the attack occurred on…

remote access to Tesla cars

Teen gets remote access to 25 Tesla cars

19-year-old David Colombo said on Twitter that he gets remote…

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

AI Assistant

Hello! 👋 How can I help you today?