The Security Blog From Gridinsoft

Rorschach Ransomware Is Probably A New Favourite

Rorschach Ransomware Analysis

Recent research from the CheckPoint Research team revealed a new ransomware sample that can potentially beat all samples currently present…

Rorschach’s New Ransomware Is Named the Fastest to Date

Check Point analysts have discovered a new ransomware, Rorschach ransomware that has already been used to attack an unnamed American…

SFX Archives Can Sneakily Launch PowerShell

CrowdStrike warns that hackers are adding malicious functionality to self-extracting SFX archives containing harmless honeypot files that can launch PowerShell.…

Genesis Market Seized by FBI

Genesis Market, a Darknet marketplace for stolen information, was reportedly seized by the FBI on Tuesday, April 4, 2023. The…

Blogger Forced ChatGPT to Generate Keys for Windows 95

YouTube user Enderman demonstrated that he was able to force ChatGPT to generate activation keys for Windows 95. Let me…

Microsoft talked about Iranian hackers

Microsoft experts talked about Iranian hackers attacks on security conference participants

Microsoft experts talked that Iranian government hackers have successfully hacked…

gridinsoft + chronicle

Gridinsoft becomes Google’s information security partner

Gridinsoft LLC is proud to be one of 68 partners…

Remove Adobe Flash from Windows

Microsoft has released an update to remove Adobe Flash from Windows

As you know, very soon, on December 31, 2020, support…

KashmirBlack is behind WordPress attacks

KashmirBlack botnet is behind attacks on popular CMS including WordPress, Joomla and Drupal

Researchers from Imperva have found that the KashmirBlack botnet, active…

Attackers deceived the notarization process

Attackers again deceived Apple’s notarization process

In September 2020, I talked about how the Shlayer malware…

New malware T-RAT

New T-RAT malware can be controlled via Telegram

G DATA’s specialists have published a report on the new…

Chrome 0-day vulnerability

Google engineers fixed Chrome 0-day vulnerability that was already under attacks

Google engineers have released an updated version of Google Chrome…

Bughunter stole Monero exploit

Bughunter stole a Monero exploit from another cybersecurity specialist and received a reward for it

Bleeping Computer reporters drew attention to an interesting case that…

P2P botnet Interplanetary Storm

P2P botnet Interplanetary Storm accounts more than 9000 devices

Bitdefender experts gave a detailed description of the work of…

the most powerful DDoS attack

Google revealed the most powerful DDoS attack in history

This week, the Google Cloud team talked about a previously…

Dangerous Bluetooth bugs in Linux

Google and Intel experts warn of dangerous Bluetooth bugs in Linux

Google and Intel engineers warn of dangerous Bluetooth bugs that…

Hackers use open source tools

Hackers are increasingly using open source tools for attacks

Speaking at the Virus Bulletin conference, Intezer Labs analysts said…