The Security Blog From Gridinsoft

New PlugX malware attacks target European diplomats

PlugX malware attacks European diplomats

Over the past few months, researchers have been monitoring the activity of a Chinese threat actor using PlugX malware to…

Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots

Trustwave has created a Snappy tool that will make it easy to determine if the Wi-Fi network is fake or…

RustBucket Malware Attacks MacOS More Effectively

New update of RustBucket Malware introduced several changes. Now the malware is more securely fixed in the systems of its…

Akira Ransomware Decryptor Is Available To The Public

Cybersecurity experts have released a decryptor for the Akira ransomware. It will allow victims who encounter attacks to decrypt their…

Russian Hacker Project DDoSIA Grew by Multiple Times

Analysts of the Sekoia company reported that the Russian DDoSia hacker project grew by 2400% in less than a year.…

BrakTooth threaten billions of devices

BrakTooth vulnerabilities threaten billions of devices around the world

A group of researchers has published information on 16 serious…

malware in AMD and Nvidia

Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale

Bleeping Computer discovered that an exploit that uses the memory…

ProxyToken vulnerability in Microsoft Exchange

ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange

A dangerous vulnerability called ProxyToken has been discovered in Microsoft…

Critical vulnerability in Cosmos DB

Microsoft warned of a critical vulnerability in Cosmos DB

Microsoft has warned thousands of Azure customers of a critical…

ransomware LockFile ProxyShell and PetitPotam

LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities

The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam…

2000 Exchange servers hacked

Over 2000 Exchange Servers Hacked Using ProxyShell Exploit

Researchers at Huntress Labs estimate that over the past few…

most attacked Linux vulnerabilities

Experts list 15 most attacked Linux vulnerabilities

Trend Micro has published a list of the top threats…

Razer Synapse vulnerability

Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges

A security researcher known as jonhat discovered a 0-day vulnerability…

Hacked the US Census Bureau

Attackers hacked the US Census Bureau using Citrix exploit

The Office of the Inspector General (OIG) reported that unknown…

Vulnerabilities in STARTTLS

Vulnerabilities in STARTTLS threaten popular email clients

At the USENIX conference, a group of German scientists announced…

List of suspects in terrorism

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting…

AI Assistant

Hello! 👋 How can I help you today?