The Security Blog From Gridinsoft

What is APT43?

APT43 Funds Cybercrime With Stolen Crypto

Researchers have identified a new state-backed hacker group in North Korea. The group in question is the North Korean hacker…

Ransomware Actors Target IBM’s Aspera Faspex

File transfer utility Aspera Faspex, developed by IBM, became a riding mare of cybercriminals. A vulnerability discovered in the past…

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver…

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges Binance sound threatening. CFTC, the U.S. regulator of commodity futures…

The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows

Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel…

Five Eyes India and Japan

Five Eyes Alliance, India and Japan Call for Backdoors in Software

Countries participating in the Five Eyes Alliance (which brings together…

MalLocker ransomware tricks Russians

MalLocker ransomware easily tricks Russians, pretending to be a screen lock from the police

Microsoft experts talked about the new Android ransomware AndroidOS/MalLocker. (hereinafter…

Cellmate chastity belts vulnerable

Cellmate men’s chastity belts are vulnerable to attacks and dangerous for users

Pen Test Partners analysts have studied an extremely unusual device:…

collecting data npm packages

Researchers discovered four npm packages that were collecting user data

Sonatype identified four npm packages that collected and sent to…

The legendary John McAfee arrested

US authorities arrested legendary John McAfee for tax avoidance

The US Department of Justice reported that the legendary John…

Google recruits a team of experts

Google recruits a team of experts to find bugs in Android applications

ZDNet reports that a number of new positions have been…

SilentFade defrauded Facebook users

Chinese hack group SilentFade defrauded Facebook users for $4,000,000

At the Virus Bulletin 2020 conference, Facebook’s security team revealed…

IPStorm now attacks Android

IPStorm botnet now attacks Android, macOS and Linux devices

For the first time, Anomali specialists noticed the IPStorm in…

ransomware attacks take 45 minutes

Microsoft estimated that ransomware attacks take less than 45 minutes

Microsoft analysts have prepared a traditional Digital Defense report, in…

Coffee machine ransom money

Avast expert taught Smarter Coffee machine to ransom money

Back in 2015, experts from Pen Test Partners talked about…

TikTok multi-factor authentication

Attackers can bypass TikTok multi-factor authentication through the site

Journalists of the ZDNet publication, citing one of their readers,…

Windows XP source codes

Windows XP source codes leaked

4chan has published a 42.9 GB torrent file, which contains…