The Security Blog From Gridinsoft

Python Package Index is Flooded with Malware

PyPI Malware Storm Forces to Suspend New Uploads

Python Package Index, a software repository for Python developers, recently faced a massive attack. An enormous flow of malicious uploads…

3 Unpopular Malware Spreading Ways in 2023

The modern Internet space is like an endless ocean, where every wave can hide a danger. If you think you…

Visual Studio Code Malicious Plugins Steal Personal Data

Some plugins for Visual Studio Code, a popular code editing tool developed by Microsoft, appear to have malicious code. In…

Trend Micro: Millions of Android Devices Contain Malware Right in the Firmware

Trend Micro analysts presented an interesting report at the Black Hat Asia conference: according to their information, millions of Android…

RedLine Stealer Issues 100,000 Samples – What is Happening?

Throughout the entire early May 2023, GridinSoft analysts team observed an anomalous activity of RedLine stealer. It is, actually, an…

Linus Torvalds and Apple M1

Linus Torvalds doubts that Linux will run on Apple M1

Recently on the Real World Technologies forum Linus Torvalds was…

A new type of cyber-biological attack

Apocalypse Now: experts presented a new type of cyber-biological attack

On Monday, November 30, specialists from the Ben-Gurion University of…

e-commerce sites over WordPress sites

Hackers create scam e-commerce sites over hacked WordPress sites

Akamai specialist Larry Cashdollar discovered a hacker group that uses…

0-day bug in Windows 7

Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008

French cybersecurity researcher Clément Labro was working on a security…

NATO experimented with deceptive techniques

NATO experimented with deceptive techniques to combat Russian hackers

During a cyber exercise in Estonia on November 16-20, NATO…

How to steal a Tesla Model X

The researcher showed how to steal a Tesla Model X in a few minutes

Information security specialist Lennert Wouters from the Catholic University of…

LidarPhone attack on vacuum cleaner

LidarPhone attack will make your vacuum cleaner spy on you

A group of scientists from the University of Maryland and…

Google services in phishing campaigns

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google…

Change your passwords

Though 2020 is ending, the list of worst passwords is still topes “123456”

The end of the year is approaching, and the developers…

FTP disabled in Chrome 87

Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support

Google engineers introduced Chrome 87, in which was disabled FTP…

VoltPillager attack on Intel SGX

VoltPillager attack compromises Intel SGX

A group of researchers from the University of Birmingham have…

Microsoft accused Russia

Microsoft accused Russia and North Korea of attacks on pharmaceutical companies

Microsoft representatives accused Russia and North Korea of attacks on…

AI Assistant

Hello! 👋 How can I help you today?