The Security Blog From Gridinsoft
Emotet Botnet Resumed Activity after Five Months of Inactivity
The Emotet botnet resumed activity and began sending out malicious spam again after a five-month break, during which the malware…
OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical
At the end of October, OpenSSL developers warned that the upcoming update to version 3.0.7 would close a critical vulnerability.…
Azov Ransomware Tries to Set Up Cybersecurity Specialists
Azov ransomware, a newcomer to the encryption malware market, appears in view with a rather unusual strategy. This malware seems…
Raspberry Robin Worm Operators Now Trade Access
Microsoft researchers reported that the operators of the hack group, which they track under the ID DEV-0950, used the Clop…
The Updated Fodcha Botnet Reaches a Capacity of 1 Tb / s and Demands a Ransom Directly in DDoS Packets
Qihoo 360 (360 Netlab) experts have warned about the emergence of an updated version of the Fodcha botnet, which embeds…
Attackers hack Roblox accounts and urge to vote for Trump
According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…
The researcher found that every 142nd password is “123456”
Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…
US cyber command warned about dangerous vulnerability in PAN-OS
The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…
Lucifer malware uses many exploits, is engaged in mining and DDoS attacks
Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, “wreaks havoc” on Windows hosts. It is noted that the authors…
Evil Corp returns to criminal activity with WastedLocker ransomware
Fox-IT experts talked about the latest activity of the famous hacker group Evil Corp. According to analysts, the group came back to life in January of this year and conducted…
Hackers force users to solve CAPTCHA
Microsoft analysts have discovered a malicious campaign, in which hackers force users to solve CAPTCHA before they gain access to malicious content in an Excel document. This file contains macros…
AMD plans to fix SMM Callout bugs in its processors by the end of June
AMD reports that firmware updates will be released for three bugs called SMM Callout by the end of June 2020. These vulnerabilities allow attackers to establish control over the AMD…
eBay employees organized persecution and intimidation of a family of bloggers
Six former eBay employees became involved in a strange trial. According to the investigation, eBay employees organized the persecution and intimidation of a couple of bloggers from the city of…
Experts discovered Chrome largest spyware installation campaign
Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains…
Vulnerabilities in old GTP protocol could affect 4G and 5G networks
Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling Protocol) could quite seriously affect the operation of 4G and 5G networks. In reports published last week and in December…
GitHub will replace the term “master” with a more neutral one
Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said on Twitter that GitHub will replace the term “master” with a more neutral synonymous. For example, main, to avoid unnecessary…