The Security Blog From Gridinsoft

Cryptocurrency Scams Aim Hot and Cold Wallets At Once

Hot and Cold Crypto Wallets Hacking

Cryptocurrency is a rapidly changing world where people can make fortunes by exchanging digital assets. However, seasoned investors and newcomers…

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a loophole in Windows kernel-mode drivers handling mechanism. They heavily bear…

Legion Stealer targeting PUBG players

Scammers are using a misleading GitHub page to distribute Legion Stealer to fans of rogue PUBG games. Under the guise…

MOVEit Transfer Fixes a New Critical Vulnerability

After hundreds of companies were attacked with a 0-day vulnerability in MOVEit Transfer, the developer of this file transfer management…

California Water Treatment Plant Is in the Hands of a Hacker

Rambler Gallo, a resident of Tracy, Calif., has been charged with maliciously damaging a computer after it allegedly infiltrated a…

Hackers exploit ProxyShell vulnerabilities

Hackers exploit ProxyShell vulnerabilities to install backdoors

Experts warn that hackers are attacking Microsoft Exchange servers, exploiting…

Print Spooler Vulnerability

Microsoft Warns of New Print Spooler Vulnerability

Microsoft has released a notice of a new vulnerability in…

patches for 44 Microsoft vulnerabilities

Microsoft releases patches for 44 vulnerabilities, including three 0-days

As part of Patch Tuesday this week, Microsoft released patches…

FlyTrap Android malware

FlyTrap Android malware compromised over 10,000 Facebook accounts

According to experts from Zimperium, Android malware FlyTrap hijacks Facebook…

Ukrainian fighters against pirates

Ukrainian fighters against pirates asked Google to block 127.0.0.1

The TorrentFreak media reports that Vindex, Ukrainian fighters against pirates,…

RansomEXX attacked Gigabyte

RansomEXX ransomware attacked Gigabyte

RansomEXX ransomware operators attacked a large Taiwanese computer hardware manufacturer…

Vulnerabilities in Amazon Kindle

Vulnerabilities in Amazon Kindle Allowed Taking Full Control of the Device

Check Point researchers reported that in April of this year,…

Google fired employees

Google fired dozens of employees for data abuse

The Vice Motherboard has obtained internal Google documents stating that…

New BlackMatter ransomware

The new BlackMatter ransomware was created by the authors of recently “closed” DarkSide

Last week, experts noticed the emergence of a new ransomware…

PwnedPiper problem

The PwnedPiper problem poses a threat to 80% of US hospitals

Armis company has released details of nine vulnerabilities collectively known…

malware under the mask of the Brave

Scammers spread malware under the mask of the Brave browser

Google specialists stopped a malicious advertising campaign in which scammers…

most attacked vulnerabilities

Experts published a list of the most attacked vulnerabilities in 2020-2021

Experts from the FBI, the US Department of Homeland Security…

AI Assistant

Hello! 👋 How can I help you today?