The Security Blog From Gridinsoft

What is APT43?

APT43 Funds Cybercrime With Stolen Crypto

Researchers have identified a new state-backed hacker group in North Korea. The group in question is the North Korean hacker…

Ransomware Actors Target IBM’s Aspera Faspex

File transfer utility Aspera Faspex, developed by IBM, became a riding mare of cybercriminals. A vulnerability discovered in the past…

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver…

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges Binance sound threatening. CFTC, the U.S. regulator of commodity futures…

The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows

Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel…

Microsoft left Bing open

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft…

Spammers hide behind IP addresses

Spammers hide behind hexadecimal IP addresses

Trustwave experts have discovered that pharmaceutical spam attackers have started…

Mozilla stops Firefox Send

Mozilla completely stops development of Firefox Send and Firefox Notes

This summer, I talked about how ZDNet journalists drew attention…

Chinese hackers attack the US

Chinese hackers attack US organizations and exploit bugs in F5, Citrix and Microsoft Exchange

The Department of Homeland Security (DHS CISA) Cybersecurity and Infrastructure…

Qbot entered the top malware

Qbot Trojan Entered The Top Of The Most Widespread Malware

Check Point has released its monthly Global Threat Index for…

INVDoS bug in Bitcoin Core

The researcher kept the INVDoS bug in Bitcoin Core secret for many years

Back in 2018, cyber security specialist and engineer Braydon Fuller…

Intel fixed a critical bug

Intel engineers fixed critical bug in AMT and ISM

Intel engineers fixed this week a critical bug with updates…

Hackers use Weave Scope

Hackers use legitimate Weave Scope tool in attacks on cloud environments

Intezer experts discovered the TeamTNT cybercriminal group, whose hackers use…

XSS vulnerability in Google Maps

Researcher Earned $10,000 by Finding XSS Vulnerability in Google Maps

Israeli cybersecurity specialist Zohar Shachar talked about his discovery of…

money laundered with cryptocurrencies

SWIFT says money is rarely laundered with cryptocurrencies

Specialists of the SWIFT organization, which operates same-named international system…

hackers use NET library

Hackers use .NET library for creating malicious Excel files

Researchers at NVISO Labs noticed that the Epic Manchego group…

Magecart extract card data

Magecart groupings extract stolen cards data via Telegram

An information security specialist known under the pseudonym Affable Kraut…

AI Assistant

Hello! 👋 How can I help you today?