The Security Blog From Gridinsoft

Shuckworm attacks Ukrainian companies

Shuckworm Gang Attacks Ukrainian Companies Using Pterodo Backdoor and USB Drives

Symantec experts report that the Shuckworm hack group (aka Armageddon, Gamaredon, Iron Tilden, Primitive Bear, Trident Ursa, UNC530, Winterflounder, and…

Cloud Mining Scams Spread Banking Trojans

It’s no secret that cybercriminals are increasingly using mobile platforms as an attack vector lately. One example is a new…

WannaCry 3.0 Ransomware Aims At Enlisted Russian-speaking Players

A previously unknown payload of ransomware, that call itself WannaCry 3.0, targets Russian-speaking players of the Enlisted game. Hackers reportedly…

Malware in GitHub Repositories Is Spread From Fake Security Company Name

Researchers detected fake company accounts on GitHub linked to a deceitful cybersecurity company. These accounts are promoting harmful repositories on…

BreachForums Is Back Online, Led by ShinyHunters

BreachForums, an infamous Darknet forum that was shut down in late March 2023, is back online since approx. June 13…

Facebook users information leaked

Information of 533 million Facebook users leaked to the public

Last weekend it became known that information of more than…

Hackers bypass firewalls

Hackers Bypass Firewalls Using Windows Feature

Hackers now bypass firewalls using a legitimate component of the…

hacking the system of a water utility

Kansas resident charged with hacking water utility computer system

This week, the US Department of Justice indicted Wyatt Travnichek,…

Hackers on behalf of Brian Krebs

Hackers attack Microsoft Exchange servers on behalf of Brian Krebs

The well-known information security expert, journalist and author of the…

bypass protection from Specter

New vulnerabilities help to bypass protection from Specter on Linux systems

On Monday, March 29th, security researchers uncovered two vulnerabilities in…

Slack Connect DM feature

Slack Connect DM new feature drew a barrage of criticism

This week Slack Messenger developers announced a new Connect DM…

Attackers using DCCP protocol

Attackers using DCCP protocol for DDoS attacks

Akamai has noticed that attackers are using the little-known DCCP…

job seekers work for cybercriminals

Check Point: Desperate Job Seekers Are Ready To Work For Cybercriminals

CheckPoint experts found that the number of job search ads…

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest…

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing…

Using DTLS amplify DDoS

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers…

AI Assistant

Hello! 👋 How can I help you today?