The Security Blog From Gridinsoft

Ransomware Attacks in 2023: What to Expect?

Ransomware Attacks in 2023: What to Expect?

Cybersecurity experts have published a report on worrying ransomware statistics. A survey of 435 cybersecurity professionals identified gaps, misunderstandings, and…

RaidForums Leaked, Data of Almost 500,000 Users Published

RaidForums, the former leader among the underground forums, now suffers the user data leak. Besides being shut down in April…

New MDBotnet Malware Rapidly Expands a DDoS Network

MDBotnet is a new malware strain that appears to be a backbone of a botnet, used in DDoS-as-a-Service attacks. Being…

Ransomware Attacks Decline in 2023 – Is It True?

According to ransomware attacks status statistics, the trend of incidents related to this type of malware will decline in 2023.…

Attackers Can Use .Zip and .Mov Domains for Phishing

Experts’ fears that attackers will use new .zip and .mov domains for phishing are beginning to be justified. A new…

Rust one of the languages for Android

Rust will become one of the main development languages for Android due to security

This week, Google developers announced that Rust will become one…

UseCrypt Messenger filed a lawsuit

UseCrypt Messenger developers filed a lawsuit against IS researcher for finding bugs

The developers of the encrypted UseCrypt Messenger have filed a…

New hCaptcha bypass method

New hCaptcha bypass method may not affect Cloudflare’s security

In March 2021, researchers at the University of Louisiana at…

operation against cheat developers

Tencent and Chinese police conducted a joint operation against game cheat developers

Chinese police in collaboration with tech giant Tencent have launched…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek,…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in…

Slack Connect DM feature

Slack Connect DM new feature drew a barrage of criticism

This week Slack Messenger developers announced a new Connect DM…

Attackers using DCCP protocol

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP…