The Security Blog From Gridinsoft

Predasus Malware Targets Users in Latin America

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Attackers targeted financial institutions, booking sites, and instant…

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) in the Ubuntu OverlayFS module. These vulnerabilities…

Google Is Working on an Information Security Project Called Web Integrity API

A team of four Google engineers is working on a new project called the Web Environment Integrity API, which will…

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that…

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will specialize in “sophisticated technical attacks on AI systems.” Among examples…

web skimmer on Sealand website

Hackers introduced a web skimmer on the site of the Sealand Principality

The Record reported that unknown hackers attacked the site of…

Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device…

members of the hacker group Phoenix

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of…

published an exploit for Windows

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Bleeping Computer reported that cybersecurity researcher has published an exploit…

smartphones to find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

A team of researchers from the National University of Singapore…

exploits as a service on the darknet

Researchers noticed that the darknet is discussing exploits as a service

Analysts at Digital Shadows have prepared a report on the…

Rowhammer attack on DDR4 memory

New Rowhammer Attack Breaks DDR4 Memory Protection

Researchers have unveiled a new fuzzing attack technique, Blacksmith, which…

FBI mail server

Hackers broke into FBI mail server and sent fake cyberattack alerts

Last weekend, unknown hackers managed to break into the mail…

Clop exploits a vulnerability in SolarWinds

Clop ransomware exploits vulnerability in SolarWinds Serv-U

The NCC Group warns of a spike of Clop ransomware…

NUCLEUS: 13 Problems

NUCLEUS: 13 Problems Threat to Medical Devices, Automobiles and Industrial Systems

Forescout and Medigate Labs issued a report on NUCLEUS:13 problems…

arrest a Kaseya hacker

US authorities arrest Kaseya hacker and attacker associated with REvil and GandCrab

Law enforcement agencies, as well as European and American authorities,…

information about DarkSide operators

US authorities offer $10 million for information on DarkSide operators

The US government has offered a $10,000,000 reward for any…

AI Assistant

Hello! 👋 How can I help you today?