The Security Blog From Gridinsoft

RedEnergy – Ransomware or Infostealer?

RedEnergy Stealer-as-a-Ransomware On The Rise

Researchers have discovered a new form of malware called RedEnergy Stealer. It is categorized as Stealer-as-a-Ransomware but is not affiliated…

Hackers Actively Exploit the 0-Day Vulnerability in the Ultimate Member WordPress Plugin

Hackers actively exploit a zero-day vulnerability in the WordPress plugin Ultimate Member to increase privileges: with the help of this…

BlackCat Ransomware Employs Malvertising In Targeted Attacks

Recently malicious actors started using malvertising to spread BlackCat ransomware. They use cloned webpages of popular freeware applications, particularly WinSCP…

MITRE Compiled a List of the 25 Most Dangerous Bugs

MITRE specialists have published a list of the 25 most dangerous bugs in software over the past two years. It…

The Number of Companies Affected by Attacks on Vulnerabilities in MOVEit Transfer Increased

The consequences of exploiting a 0-day vulnerability in MOVEit Transfer’s file transfer management solution continue to spread. The total number…

XSS Banned Ransomware Ads

Hacker XSS Forum Banned Ransomware Ads

The administration of the popular hacker forum XSS (formerly DaMaGeLab)…

vulnerability in the universal Turing machine

Scientist discovered a vulnerability in the universal Turing machine

Pontus Johnson, a professor at the Royal Institute of Technology…

Wi-Fi Devices and Frag Attacks

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery…

cyberattacks on water supply systems

FBI investigates cyberattacks on two water supply systems in Pennsylvania

Last month, the local Water Action Response Network, which includes…

Qualcomm Mobile Station Modem

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world…

Chrome 90 security feature

Chrome 90 gets new security feature to protect against attacks on Windows 10

Google has introduced a new Windows 10 security feature called…

Adobe flash player

Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021

According to manufacturers’ elaborate plan, since beginning of 2021 support…

bypasses Specter protection

New Micro-op Cache Attack Bypasses Specter Protection

A team of researchers from the Universities of Virginia and…

GitHub review exploit policy

GitHub Developers Review Exploit Posting Policy Due to Recent Scandal

The GitHub developers review the exploit posting policy and want…

Hacked OGUsers Forum

Attackers Hacked OGUsers Hacking Forum Again

Recently, the media reported that attackers hacked one of the…

major vulnerability in V8

Google fixed another major vulnerability in the V8 engine

A series of feverish fixes for problems in Google Chrome…

new Apple logo

Criminals threaten to leak new Apple logo, if the company doesn’t pay the ransom

Last week it became known that the operators of the…

AI Assistant

Hello! 👋 How can I help you today?