The Security Blog From Gridinsoft

Fake security company is spreading malware through GitHub

Malware in GitHub Repositories Is Spread From Fake Security Company Name

Researchers detected fake company accounts on GitHub linked to a deceitful cybersecurity company. These accounts are promoting harmful repositories on…

BreachForums Is Back Online, Led by ShinyHunters

BreachForums, an infamous Darknet forum that was shut down in late March 2023, is back online since approx. June 13…

New critical vulnerabilities found in MOVEit Transfer

It became known that during the audit in the solution for managing file transfer MOVEit Transfer, new critical vulnerabilities were…

RDP Honeypot Was Attacked 3.5 Million Times

With increased remote work, IT teams use remote access tools to manage company devices and ensure smooth operations. Remote desktop…

Information Security Experts Published a PoC Exploit for a Vulnerability in Win32k

Information security experts have published a PoC exploit for a privilege escalation vulnerability in the Win32k driver that was fixed…

decryptor for Lorenz ransomware

Cybersecurity specialists released a free decryptor for Lorenz ransomware

Dutch company Tesorion has released a free decryptor for data…

PrintNightmare in Windows

Exploit for dangerous PrintNightmare problem in Windows has been published online

A PoC exploit for the dangerous PrintNightmare vulnerability in Windows…

Babuk Locker builder

Babuk Locker ransomware builder leaked into the network

The Babuk Locker ransomware builder has appeared in the public…

Clop continues to work

Clop ransomware continues to work even after a series of arrests

The media reported that Clop ransomware continues to work: its…

John McAfee found dead

John McAfee, creator of McAfee antivirus, found dead in prison in Barcelona

On June 23, 75-year-old programmer and creator of the first…

DirtyMoe botnet infected

Previously assessed as insignificant, DirtyMoe botnet infected over 100,000 Windows systems

The developers of the DirtyMoe botnet (which was assessed as…

Encryption algorithms for 2G networks

Encryption algorithms for 2G networks have been intentionally weakened

A group of scientists from several European universities published a…

Cyber police of Ukraine and Clop

Cyber police of Ukraine arrested persons linked with the Clop ransomware

As a result of a joint operation carried out with…

Attacks on Poland government

Russian-speaking hackers attacked the government infrastructure of Poland

The Sejm of Poland will hold a secret meeting, at…

shorten URLs

Google stopped trying to shorten URLs in the address bar

Google’s experiment with attempt to shorten URLs (hiding parts of…

Quantum computers will hack

Quantum computers will be able to hack bitcoin wallets

Experts argue that quantum computers will be able to hack…

attacks on Kubernetes clusters

Microsoft warns of mining attacks on Kubernetes clusters

Microsoft has warned of ongoing attacks on Kubernetes clusters running…