The Security Blog From Gridinsoft

PaperCut Contains Two Critical Vulnerabilities

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to be vulnerable to remote code execution (RCE). Another security violation…

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers…

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another…

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this…

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen from Microsoft, including the source codes of Bing, Bing Maps…

Five Eyes India and Japan

Five Eyes Alliance, India and Japan Call for Backdoors in Software

Countries participating in the Five Eyes Alliance (which brings together…

MalLocker ransomware tricks Russians

MalLocker ransomware easily tricks Russians, pretending to be a screen lock from the police

Microsoft experts talked about the new Android ransomware AndroidOS/MalLocker. (hereinafter…

Cellmate chastity belts vulnerable

Cellmate men’s chastity belts are vulnerable to attacks and dangerous for users

Pen Test Partners analysts have studied an extremely unusual device:…

collecting data npm packages

Researchers discovered four npm packages that were collecting user data

Sonatype identified four npm packages that collected and sent to…

The legendary John McAfee arrested

US authorities arrested legendary John McAfee for tax avoidance

The US Department of Justice reported that the legendary John…

Google recruits a team of experts

Google recruits a team of experts to find bugs in Android applications

ZDNet reports that a number of new positions have been…

SilentFade defrauded Facebook users

Chinese hack group SilentFade defrauded Facebook users for $4,000,000

At the Virus Bulletin 2020 conference, Facebook’s security team revealed…

IPStorm now attacks Android

IPStorm botnet now attacks Android, macOS and Linux devices

For the first time, Anomali specialists noticed the IPStorm in…

ransomware attacks take 45 minutes

Microsoft estimated that ransomware attacks take less than 45 minutes

Microsoft analysts have prepared a traditional Digital Defense report, in…

Coffee machine ransom money

Avast expert taught Smarter Coffee machine to ransom money

Back in 2015, experts from Pen Test Partners talked about…

TikTok multi-factor authentication

Attackers can bypass TikTok multi-factor authentication through the site

Journalists of the ZDNet publication, citing one of their readers,…

Windows XP source codes

Windows XP source codes leaked

4chan has published a 42.9 GB torrent file, which contains…

AI Assistant

Hello! 👋 How can I help you today?