The Security Blog From Gridinsoft

heads of cybersecurity departments

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…

Hackers Broke into Activision’s Slack and Stole Data

Activision, the publisher of computer games (including the Call of Duty franchise), reported a security breach that occurred back in…

Cybersecurity Experts Discovered a New Stealc Infostealer

ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due…

Hackers Attacked GoDaddy and Stayed on the Company’s Systems for Several Years

One of the world’s largest hosters and domain name registrars, GoDaddy, reports that hackers have compromised the company’s infrastructure. Worse,…

FatalRAT Malware Masks As Popular Apps in Google Ads

ESET experts have discovered the FatalRAT malware, which targets Chinese-speaking users: the threat is distributed through fake websites of popular…

Telegram for macOS

Telegram for macOS did not delete self-destructing videos

Telegram developers have fixed a bug due to which self-destructing audio and video were not removed from devices running macOS. Let me remind you that in the secret chat mode,…

cyberattacks using web shells

Microsoft warns of growing number of cyberattacks using web shells

Microsoft has warned of an increase of cyberattacks using web shells. Cybercriminals often use web shells to secure their presence on compromised networks. Compared to last year, the average monthly…

new dependency confusion attack

Researcher compromised 35 companies through new “dependency confusion” attack

Information security expert Alex Birsan spoke about a new attack called “dependency confusion”. The problem is a variation of the supply chain attack. Besides the name “dependency confusion”, the attacks…

Ukrainian cyber police uPanel

Ukrainian cyber police arrested the author of uPanel phishing kit

Ukrainian cyber police have arrested a 39-year-old man who is probably the author of uPanel, one of the most popular phishing kits on the black market. The arrest of the…

hacker changed the composition of water

Hacker changed the chemical composition of drinking water in a small Florida town

Law enforcement and local authorities in Oldsmar, Florida, reported that on February 5, 2021, an unknown hacker gained access to the city’s wastewater treatment plant and changed the chemical composition…

Chrome Sync function

Researcher discovered that Chrome Sync function can be used to steal data

Croatian researcher Bojan Zdrnja discovered a malicious Chrome extension abusing Chrome Sync. If you do not use Chrome, let me remind you that this function is applied to synchronize data…

Google paid cybersecurity experts

In 2020, Google paid cybersecurity experts $6.7 million

During the year, Google paid out 6.7 million to cybersecurity experts and published statistics on bug bounty programs for 2020. It turned out that during this time, researchers from 62…

Google on 0-day vulnerabilities

Google says that a quarter of all 0-day vulnerabilities are new variations of old problems

Google analysts studied the 0-day vulnerabilities they discovered in 2020, and concluded that almost a quarter of the problems are new variations of already known bugs that had previously received…

WEF warned of cyber pandemic

WEF warned of impending cyber pandemic

The WEF experts warned about the impending cyber pandemic and called for new approaches to risk management associated with the development of next generation technologies. By 2025, next-generation technologies such…

Android emulator NoxPlayer with malware

Hackers infected the Android emulator NoxPlayer with malware

UPDATE: BigNox contacted us and said that they “contacted cybersecurity firm ESET to determine the root cause of the issue,” and at this point “fixed all issues.” ESET has released…

FonixCrypter ransomware stopped working

FonixCrypter ransomware stopped working and published a key to decrypt data

The authors of the FonixCrypter ransomware announced that they had removed the source code of their malware and after this FonixCrypter stopped working. Along with this statement, they published a…

LogoKit phishing kit

LogoKit phishing kit allows creating phishing pages in real time

RiskIQ researchers said that the new LogoKit phishing kit was detected on more than 700 unique domains in the last month alone and on 300 in the last week. Worse,…