The Security Blog From Gridinsoft

AI and brain signals

AI Generated Video Based on Mouse Brain Signals

A team of researchers from the EPFL has developed an AI tool that can interpret rodent brain signals in real…

BlackCat Group Leaks Western Digital Data to the Network

The operators of the ransomware BlackCat (aka ALPHV) have published screenshots of Western Digital’s internal emails and video conferences. The…

LOBSHOT malware steals cryptowallets, exploits Google Ads

LOBSHOT, a recently-detected malware family, appears to be a new strong player in the malware market. Carrying a combination of…

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept into Microsoft Edge – the fact is that, starting with…

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware operations by Clop and LockBit, which used vulnerabilities to steal…

gridinsoft + chronicle

Gridinsoft becomes Google’s information security partner

Gridinsoft LLC is proud to be one of 68 partners…

Remove Adobe Flash from Windows

Microsoft has released an update to remove Adobe Flash from Windows

As you know, very soon, on December 31, 2020, support…

KashmirBlack is behind WordPress attacks

KashmirBlack botnet is behind attacks on popular CMS including WordPress, Joomla and Drupal

Researchers from Imperva have found that the KashmirBlack botnet, active…

Attackers deceived the notarization process

Attackers again deceived Apple’s notarization process

In September 2020, I talked about how the Shlayer malware…

New malware T-RAT

New T-RAT malware can be controlled via Telegram

G DATA’s specialists have published a report on the new…

Chrome 0-day vulnerability

Google engineers fixed Chrome 0-day vulnerability that was already under attacks

Google engineers have released an updated version of Google Chrome…

Bughunter stole Monero exploit

Bughunter stole a Monero exploit from another cybersecurity specialist and received a reward for it

Bleeping Computer reporters drew attention to an interesting case that…

P2P botnet Interplanetary Storm

P2P botnet Interplanetary Storm accounts more than 9000 devices

Bitdefender experts gave a detailed description of the work of…

the most powerful DDoS attack

Google revealed the most powerful DDoS attack in history

This week, the Google Cloud team talked about a previously…

Dangerous Bluetooth bugs in Linux

Google and Intel experts warn of dangerous Bluetooth bugs in Linux

Google and Intel engineers warn of dangerous Bluetooth bugs that…

Hackers use open source tools

Hackers are increasingly using open source tools for attacks

Speaking at the Virus Bulletin conference, Intezer Labs analysts said…

Malicious Windows Update client

Attackers can use Windows Update client to execute malicious code

Hackers can exploit Windows Update client to execute malicious code…

AI Assistant

Hello! 👋 How can I help you today?