The Security Blog From Gridinsoft

Cloud Mining Scams Spread Roamer, the Android banking trojan

Cloud Mining Scams Spread Banking Trojans

It’s no secret that cybercriminals are increasingly using mobile platforms as an attack vector lately. One example is a new…

WannaCry 3.0 Ransomware Aims At Enlisted Russian-speaking Players

A previously unknown payload of ransomware, that call itself WannaCry 3.0, targets Russian-speaking players of the Enlisted game. Hackers reportedly…

Malware in GitHub Repositories Is Spread From Fake Security Company Name

Researchers detected fake company accounts on GitHub linked to a deceitful cybersecurity company. These accounts are promoting harmful repositories on…

BreachForums Is Back Online, Led by ShinyHunters

BreachForums, an infamous Darknet forum that was shut down in late March 2023, is back online since approx. June 13…

New critical vulnerabilities found in MOVEit Transfer

It became known that during the audit in the solution for managing file transfer MOVEit Transfer, new critical vulnerabilities were…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek,…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in…

Slack Connect DM feature

Slack Connect DM new feature drew a barrage of criticism

This week Slack Messenger developers announced a new Connect DM…

Attackers using DCCP protocol

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP…

job seekers work for cybercriminals

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

CheckPoint experts found that the number of job search ads…

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest…

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing…

Using DTLS amplify DDoS

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers…

hackers have access to missile

REvil spokesman boasts that hackers have access to ballistic missile launch systems

A Revil representative under the pseudonym Unknown, claims that the…

AI Assistant

Hello! 👋 How can I help you today?