The Security Blog From Gridinsoft

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is sold via Telegram and is used as a way to…

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat actor over the last two years, released the variant of…

Domino Backdoor is Lead by FIN7 and Conti Actors

A new Domino Backdoor popped out at the beginning of 2023. Since February, a new malware family coined Domino is…

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894…

Alien malware steals passwords

Alien malware steals passwords from 226 Android apps

ThreatFabric analysts have discovered a new Android malware Alien. The…

LokiBot infostealer activity growth

CISA experts warned about the growth of LokiBot infostealer activity

Specialists from the Agency for Cybersecurity and Infrastructure Protection, organized…

Microsoft left Bing open

Microsoft left open one of the internal servers of the search engine Bing

Ata Hakcil, cyber security specialist at WizCase, discovered that Microsoft…

Spammers hide behind IP addresses

Spammers hide behind hexadecimal IP addresses

Trustwave experts have discovered that pharmaceutical spam attackers have started…

Mozilla stops Firefox Send

Mozilla completely stops development of Firefox Send and Firefox Notes

This summer, I talked about how ZDNet journalists drew attention…

Chinese hackers attack the US

Chinese hackers attack US organizations and exploit bugs in F5, Citrix and Microsoft Exchange

The Department of Homeland Security (DHS CISA) Cybersecurity and Infrastructure…

Qbot entered the top malware

Qbot Trojan Entered The Top Of The Most Widespread Malware

Check Point has released its monthly Global Threat Index for…

INVDoS bug in Bitcoin Core

The researcher kept the INVDoS bug in Bitcoin Core secret for many years

Back in 2018, cyber security specialist and engineer Braydon Fuller…

Intel fixed a critical bug

Intel engineers fixed critical bug in AMT and ISM

Intel engineers fixed this week a critical bug with updates…

Hackers use Weave Scope

Hackers use legitimate Weave Scope tool in attacks on cloud environments

Intezer experts discovered the TeamTNT cybercriminal group, whose hackers use…

XSS vulnerability in Google Maps

Researcher Earned $10,000 by Finding XSS Vulnerability in Google Maps

Israeli cybersecurity specialist Zohar Shachar talked about his discovery of…

money laundered with cryptocurrencies

SWIFT says money is rarely laundered with cryptocurrencies

Specialists of the SWIFT organization, which operates same-named international system…

AI Assistant

Hello! 👋 How can I help you today?