The Security Blog From Gridinsoft

Black Cat and Western Digital

BlackCat Group Leaks Western Digital Data to the Network

The operators of the ransomware BlackCat (aka ALPHV) have published screenshots of Western Digital’s internal emails and video conferences. The…

LOBSHOT malware steals cryptowallets, exploits Google Ads

LOBSHOT, a recently-detected malware family, appears to be a new strong player in the malware market. Carrying a combination of…

Microsoft Edge Exposes Bing API Addresses of Attended Sites

Users have noticed that a bug seems to have crept into Microsoft Edge – the fact is that, starting with…

Clop and LockBit Ransomware Exploit Fresh Vulnerabilities in PaperCut

Microsoft has linked recent attacks on PaperCut servers to ransomware operations by Clop and LockBit, which used vulnerabilities to steal…

PaperCut Vulnerability Allows RCE, Exploited in the Wild

PaperCut, a software solution used for print management, appears to be vulnerable to remote code execution (RCE). Another security violation…

collecting data npm packages

Researchers discovered four npm packages that were collecting user data

Sonatype identified four npm packages that collected and sent to…

The legendary John McAfee arrested

US authorities arrested legendary John McAfee for tax avoidance

The US Department of Justice reported that the legendary John…

Google recruits a team of experts

Google recruits a team of experts to find bugs in Android applications

ZDNet reports that a number of new positions have been…

SilentFade defrauded Facebook users

Chinese hack group SilentFade defrauded Facebook users for $4,000,000

At the Virus Bulletin 2020 conference, Facebook’s security team revealed…

IPStorm now attacks Android

IPStorm botnet now attacks Android, macOS and Linux devices

For the first time, Anomali specialists noticed the IPStorm in…

ransomware attacks take 45 minutes

Microsoft estimated that ransomware attacks take less than 45 minutes

Microsoft analysts have prepared a traditional Digital Defense report, in…

Coffee machine ransom money

Avast expert taught Smarter Coffee machine to ransom money

Back in 2015, experts from Pen Test Partners talked about…

TikTok multi-factor authentication

Attackers can bypass TikTok multi-factor authentication through the site

Journalists of the ZDNet publication, citing one of their readers,…

Windows XP source codes

Windows XP source codes leaked

4chan has published a 42.9 GB torrent file, which contains…

Alien malware steals passwords

Alien malware steals passwords from 226 Android apps

ThreatFabric analysts have discovered a new Android malware Alien. The…

LokiBot infostealer activity growth

CISA experts warned about the growth of LokiBot infostealer activity

Specialists from the Agency for Cybersecurity and Infrastructure Protection, organized…

Microsoft left Bing open

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft…

AI Assistant

Hello! 👋 How can I help you today?