The Security Blog From Gridinsoft

Phishing Dangers of .zip Domains

Are .zip Domains Safe to Use and Visit?

The Internet has become our second home. Every time we surf the Internet, we scammed. And this time, cybercriminals did…

Twitter Blue to X Phishing Breakout

Amid the chaos of Twitter’s transition to the new name – X, scammers have devised yet another deception scheme. They…

Bahamut APT Targets Users With Fake SafeChat App

Attackers are using a fake SafeChat Android app to attack users in the South Asian region. The malware is designed…

Conti Members Are Back in Action as Part of Akira Ransomware

Experts are intestigating activity of the ransomware group Akira, which has compromised at least 63 organizations since March 2023, mostly…

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact…

Google Stops Glupteba Botnet

Google Stops Glupteba Botnet and Sues Two Russians

Google representatives said that they stopped the work of the…

Vulnerability in Apple iCloud

Vulnerability in Apple iCloud puts billion users at risk

Security of over a billion iPhone owners and users of…

cyberattacks against ransomware

US Cyber ​​Command confirms cyberattacks against ransomware

The United States Cyber Command has publicly recognized the use…

web skimmer on Sealand website

Hackers introduced a web skimmer on the site of the Sealand Principality

The Record reported that unknown hackers attacked the site of…

Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device Management Service

Unofficial fixes released for 0-day issue in Windows Mobile Device…

members of the hacker group Phoenix

Ukrainian law enforcement officers arrested members of the hacker group Phoenix

The Security Service of Ukraine (SBU) announced the arrest of…

published an exploit for Windows

Cybersecurity researchers published an exploit for Windows that allows escalating privileges

Bleeping Computer reported that cybersecurity researcher has published an exploit…

smartphones to find hidden cameras

Researchers have suggested using smartphones to find hidden cameras

A team of researchers from the National University of Singapore…

exploits as a service on the darknet

Researchers noticed that the darknet is discussing exploits as a service

Analysts at Digital Shadows have prepared a report on the…

Rowhammer attack on DDR4 memory

New Rowhammer Attack Breaks DDR4 Memory Protection

Researchers have unveiled a new fuzzing attack technique, Blacksmith, which…

FBI mail server

Hackers broke into FBI mail server and sent fake cyberattack alerts

Last weekend, unknown hackers managed to break into the mail…

AI Assistant

Hello! 👋 How can I help you today?