The Security Blog From Gridinsoft

RustBucket malware attacks macOS

RustBucket Malware Attacks MacOS More Effectively

New update of RustBucket Malware introduced several changes. Now the malware is more securely fixed in the systems of its…

Akira Ransomware Decryptor Is Available To The Public

Cybersecurity experts have released a decryptor for the Akira ransomware. It will allow victims who encounter attacks to decrypt their…

Russian Hacker Project DDoSIA Grew by Multiple Times

Analysts of the Sekoia company reported that the Russian DDoSia hacker project grew by 2400% in less than a year.…

RedEnergy Stealer-as-a-Ransomware On The Rise

Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated…

Hackers Actively Exploit the 0-Day Vulnerability in the Ultimate Member WordPress Plugin

Hackers actively exploit a zero-day vulnerability in the WordPress plugin Ultimate Member to increase privileges: with the help of this…

Colonial Pipeline paid criminals

Colonial Pipeline CEO Confirms that Company Paid Criminals $4.4M

The head of Colonial Pipeline confirmed that the company paid…

vaccine against Russian hackers

Cyrillic on the keyboard may become a “vaccine” against Russian hackers

After the sensational cyberattack on the American fuel giant Colonial…

patches for Frag Attacks problems

Manufacturers release patches for Frag Attacks problems

Manufacturers of various Wi-Fi-enabled equipment and software developers for this…

XSS Banned Ransomware Ads

Hacker XSS Forum Banned Ransomware Ads

The administration of the popular hacker forum XSS (formerly DaMaGeLab)…

vulnerability in the universal Turing machine

Scientist discovered a vulnerability in the universal Turing machine

Pontus Johnson, a professor at the Royal Institute of Technology…

Wi-Fi Devices and Frag Attacks

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery…

cyberattacks on water supply systems

FBI investigates cyberattacks on two water supply systems in Pennsylvania

Last month, the local Water Action Response Network, which includes…

Qualcomm Mobile Station Modem

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world…

Chrome 90 security feature

Chrome 90 gets new security feature to protect against attacks on Windows 10

Google has introduced a new Windows 10 security feature called…

Adobe flash player

Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021

According to manufacturers’ elaborate plan, since beginning of 2021 support…

bypasses Specter protection

New Micro-op Cache Attack Bypasses Specter Protection

A team of researchers from the Universities of Virginia and…

GitHub review exploit policy

GitHub Developers Review Exploit Posting Policy Due to Recent Scandal

The GitHub developers review the exploit posting policy and want…

AI Assistant

Hello! 👋 How can I help you today?