The Security Blog From Gridinsoft

Malware Notebook Data

Emotet Botnet Resumed Activity after Five Months of Inactivity

The Emotet botnet resumed activity and began sending out malicious spam again after a five-month break, during which the malware…

OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical

At the end of October, OpenSSL developers warned that the upcoming update to version 3.0.7 would close a critical vulnerability.…

Azov Ransomware Tries to Set Up Cybersecurity Specialists

Azov ransomware, a newcomer to the encryption malware market, appears in view with a rather unusual strategy. This malware seems…

Raspberry Robin Worm Operators Now Trade Access

Microsoft researchers reported that the operators of the hack group, which they track under the ID DEV-0950, used the Clop…

The Updated Fodcha Botnet Reaches a Capacity of 1 Tb / s and Demands a Ransom Directly in DDoS Packets

Qihoo 360 (360 Netlab) experts have warned about the emergence of an updated version of the Fodcha botnet, which embeds…

Attackers hack Roblox accounts

Attackers hack Roblox accounts and urge to vote for Trump

According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…

every 142nd password is “123456”

The researcher found that every 142nd password is “123456”

Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…

dangerous vulnerability in PAN-OS

US cyber command warned about dangerous vulnerability in PAN-OS

The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…

hackers exploit the BLM theme

Check Point: hackers exploit BLM theme for attacks

Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…

Lucifer malware uses exploits

Lucifer malware uses many exploits, is engaged in mining and DDoS attacks

Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, “wreaks havoc” on Windows hosts. It is noted that the authors…

Evil Corp with WastedLocker Ransomware

Evil Corp returns to criminal activity with WastedLocker ransomware

Fox-IT experts talked about the latest activity of the famous hacker group Evil Corp. According to analysts, the group came back to life in January of this year and conducted…

Hackers force to solve CAPTCHA

Hackers force users to solve CAPTCHA

Microsoft analysts have discovered a malicious campaign, in which hackers force users to solve CAPTCHA before they gain access to malicious content in an Excel document. This file contains macros…

AMD SMM Callout bugs

AMD plans to fix SMM Callout bugs in its processors by the end of June

AMD reports that firmware updates will be released for three bugs called SMM Callout by the end of June 2020. These vulnerabilities allow attackers to establish control over the AMD…

EBay organized persecution of bloggers

eBay employees organized persecution and intimidation of a family of bloggers

Six former eBay employees became involved in a strange trial. According to the investigation, eBay employees organized the persecution and intimidation of a couple of bloggers from the city of…

Chrome spyware installation campaign

Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains…

Vulnerabilities in Old GTP

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December…

GitHub will replace the term "master"

GitHub will replace the term “master” with a more neutral one

Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said on Twitter that GitHub will replace the term “master” with a more neutral synonymous. For example, main, to avoid unnecessary…