The Security Blog From Gridinsoft

CAPTCHA solving services

Real People Perform CAPTCHA Solving Services for Hackers

Trend Micro analysts talked about several services that offer CAPTCHA solving services for cybercriminals. According to the researchers, often these…

Android Malware With Almost 500M Downloads Resides in Google Play

Millions of Android users may be at risk of a cyberattack because of Android malware, and multiple modifications on Google…

RarBG Torrenting Site Is Shut Down, Admins Explain Why

RarBG, one of the most famous torrent tracker websites in the world, decided to voluntarily shut down. Launched in 2007,…

Ransomware Attacks in 2023: What to Expect?

Cybersecurity experts have published a report on worrying ransomware statistics. A survey of 435 cybersecurity professionals identified gaps, misunderstandings, and…

RaidForums Leaked, Data of Almost 500,000 Users Published

RaidForums, the former leader among the underground forums, now suffers the user data leak. Besides being shut down in April…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek,…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in…

Slack Connect DM feature

Slack Connect DM new feature drew a barrage of criticism

This week Slack Messenger developers announced a new Connect DM…

Attackers using DCCP protocol

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP…

job seekers work for cybercriminals

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

CheckPoint experts found that the number of job search ads…

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest…

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing…

Using DTLS amplify DDoS

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers…