The Security Blog From Gridinsoft

Pandora Botnet Exploits Android TVs for Attacks

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively…

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable…

NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers

On September 7, 2023, NCA released a statement regarding the new complex pack of sanctions against Russian Conti cybercrime group…

Can Zero-Day Attacks Be Prevented With Patches?

In recent years, zero-day exploits and attacks have become prominent emerging threats. These attacks take advantage of unknown vulnerabilities within…

QakBot Botnet Dismantled, But Can It Return?

On Tuesday, the US authorities announced that as a result of the international law enforcement operation “Duck Hunt,” the infamous…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

Aquatic Panda exploits Log4Shell

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury…

Magnat campaigns delivering fake installers

Magnat campaigns delivering fake installers

Cyber security specialists warn of the Magnat malicious distribution waves…

2easy trading platform

The 2easy trading platform is gaining popularity on the darknet

KELA analysts say that the 2easy trading platform is gaining…

another Log4j vulnerability

Another vulnerability found in Log4j, this time it is a denial of service

Log4Shell, recently discovered in the popular logging library Log4j, which…

Apache Log4j Vulnerability explained by Google

Apache Log4j Vulnerability explained by Google

On December 17th, 2021 in their blog Google Open Source…

Log4j threatens Java packages

Log4j vulnerability threatens 35,000 Java packages

Google scanned Maven Central, the largest Java repository to date,…

HelloKitty is controlled by operators from Ukraine

The FBI believes that the HelloKitty cryptor is controlled by operators from Ukraine

A medical organization from Oregon, which recently reported a breach…

Windows AppX Installer vulnerability

Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

The latest of this year, December’s patch Tuesday brought fixes…

attacks on the Log4Shell vulnerability

Experts are already fixing attacks on the Log4Shell vulnerability

Security researchers are already scanning the network looking for products…

AI Assistant

Hello! 👋 How can I help you today?