The Security Blog From Gridinsoft

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed for free on GitHub. It turned out that the creator…

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software…

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car…

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators…

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as…

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS…

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (ZDI) team…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division…

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and…

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app…

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay…

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Cybersecurity and Infrastructure Protection Agency (CISA), part of the US…

LiveJournal users data

To the network leaked data of 33.7 million LiveJournal users

In the Telegram channel of the head of DeviceLock company…

Hackers attacked Stadler

Hackers attacked Swiss company Stadler that produces trains

Hackers attacked the company Stadler. A well-known Swiss train manufacturer…

Botnet Cereals downloaded anime

For eight years, the Cereals botnet existed for only one purpose: it downloaded anime

The Cereals IoT botnet appeared in 2012, and reached its…

Fresenius attacked with Snake ransomware

Europe’s largest private hospital operator Fresenius attacked with Snake ransomware

Fresenius, Europe’s largest private hospital operator and major provider of…

Jio disclosed COVID-19 data

Techno giant Jio disclosed data of people tested for COVID-19

Recently, India’s technology giant Jio, partly acquired by Facebook, has…