The Security Blog From Gridinsoft

Cryptocurrency Scams Aim Hot and Cold Wallets At Once

Hot and Cold Crypto Wallets Hacking

Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers…

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear…

Legion Stealer targeting PUBG players

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise…

MOVEit Transfer Fixes a New Critical Vulnerability

After hundreds of companies were attacked with a 0-day vulnerability in MOVEit Transfer, the developer of this file transfer management…

California Water Treatment Plant Is in the Hands of a Hacker

Rambler Gallo, a resident of Tracy, Calif., has been charged with maliciously damaging a computer after it allegedly infiltrated a…

Microsoft fixes 81 bugs

Microsoft fixes 81 bugs, including vulnerability under attacks

Microsoft has released updates for its products: in total, this…

ALPACA use wildcard certificates

NSA warns of ALPACA attacks that use wildcard certificates

The US National Security Agency issued a security bulletin warning…

Facebook account of USS Kidd

Unknown hacked Facebook account of USS Kidd and streamed Age of Empires

Earlier this week, an unknown person hacked into the Facebook…

Experts discovered a UEFI bootkit

Experts discovered ESPecter UEFI bootkit used for espionage

ESET experts discovered the previously unknown ESPecter UEFI bootkit, which…

Facebook explained reasons for the failure

Facebook explained reasons for the global failure

Yesterday, Facebook, Instagram and WhatsApp did not work for more…

Cyber Police and ransomware operators

Ukrainian cyber police arrested ransomware operators who “earned” $150 million

Ukrainian Cyber Police have arrested two operators of an unnamed…

Apple AirTag vulnerability

Users can be lured to a malicious site through a vulnerability in Apple AirTag

Security researcher Bobby Rauch discovered a vulnerability in AirTag key…

payments with Apple Pay and Visa

Experts showed fraudulent payments from a locked iPhone with Apple Pay and a Visa card

Scientists talked about how to make fraudulent payments using Apple…

Group-IB head arrested

The head of the Group-IB arrested, searches were carried out in the company’s office

Today, September 29, 2021, the media reported that yesterday the…

Google Manifest V3

Google developers told how they will implement Manifest V3

This week, Google developers shared their plans to bring the…

REvil deceived its partners

Hack group REvil deceived their partners due to a backdoor

The researchers found that the creators of REvil deceived their…

FBI and the key from REvil

FBI Kept Secret Key To Decrypt Data After REvil Attacks

Journalists of The Washington Post found out how the FBI…

AI Assistant

Hello! 👋 How can I help you today?