The Security Blog From Gridinsoft

Fake Telegram Apps Infected More than 10 million Users

Spyware in Fake Telegram Apps Infected Over 10 million Users

It is important to exercise caution when using messenger mods. There have been reports of spyware disguised as modified versions…

Mirai variant “Pandora” infects Android TV for DDoS attacks.

A new variant of the Mirai malware botnet has been detected, infecting low-cost Android TV set-top boxes. They are extensively…

W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit

In the ever-evolving landscape of cyber threats, crooks continually find new and inventive ways to exploit vulnerabilities and target valuable…

NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers

On September 7, 2023, NCA released a statement regarding the new complex pack of sanctions against Russian Conti cybercrime group…

Can Zero-Day Attacks Be Prevented With Patches?

In recent years, zero-day exploits and attacks have become prominent emerging threats. These attacks take advantage of unknown vulnerabilities within…

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

Aquatic Panda exploits Log4Shell

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury…

Magnat campaigns delivering fake installers

Magnat campaigns delivering fake installers

Cyber security specialists warn of the Magnat malicious distribution waves…

2easy trading platform

The 2easy trading platform is gaining popularity on the darknet

KELA analysts say that the 2easy trading platform is gaining…

another Log4j vulnerability

Another vulnerability found in Log4j, this time it is a denial of service

Log4Shell, recently discovered in the popular logging library Log4j, which…

Apache Log4j Vulnerability explained by Google

Apache Log4j Vulnerability explained by Google

On December 17th, 2021 in their blog Google Open Source…

Log4j threatens Java packages

Log4j vulnerability threatens 35,000 Java packages

Google scanned Maven Central, the largest Java repository to date,…

HelloKitty is controlled by operators from Ukraine

The FBI believes that the HelloKitty cryptor is controlled by operators from Ukraine

A medical organization from Oregon, which recently reported a breach…

Windows AppX Installer vulnerability

Microsoft patches Windows AppX Installer vulnerability that spreads Emotet malware

The latest of this year, December’s patch Tuesday brought fixes…

AI Assistant

Hello! 👋 How can I help you today?