The Security Blog From Gridinsoft

MSMQ Security Flaw Allows RCE

MSMQ Vulnerability Allows Remote Code Execution

Recent update released by Microsoft, an April Patch Tuesday, revealed a severe vulnerability in Microsoft Message Queueing mechanism. That vulnerability…

Hackers Infect eFile Tax Filing Service with Malware

The eFile service, used by many Americans to file their tax returns and authorized by the US Internal Revenue Service…

Rilide Malware Steals Data from Chromium Browsers

Trustwave SpiderLabs specialists spoke about the new Rilide malware, which steals confidential data and cryptocurrency, targeting Chromium browsers. Basically, Rilide…

Rorschach Ransomware Analysis

Recent research from the CheckPoint Research team revealed a new ransomware sample that can potentially beat all samples currently present…

Rorschach’s New Ransomware Is Named the Fastest to Date

Check Point analysts have discovered a new ransomware, Rorschach ransomware that has already been used to attack an unnamed American…

SoftServe has been attacked by a ransomware

Ukraine’s largest IT company SoftServe has been attacked by a ransomware

One of the largest IT companies in Ukraine, SoftServe (number…

KryptoCibule malware steals cryptocurrency

KryptoCibule malware steals cryptocurrency from Windows users

ESET specialists discovered the KryptoCibule malware, which has been active…

Shlayer bypassed Apple checks

Shlayer malware bypassed Apple security checks

Security expert Peter Dantini discovered that the Shlayer malware bypassed…

not enter PIN code for VISA

Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards

Scientists from the Swiss Higher Technical School of Zurich have…

Twitter and Graphika neutralized Dracula

Twitter and Graphika neutralized Dracula propaganda botnet

Experts from the Graphika research group talked about how they…

malicious plugin for 3Ds Max

Hackers use in attacks malicious plugin for 3Ds Max

Bitdefender experts have discovered a hacker group that is attacking…

SpiKey allows opening lock

SpiKey technique allows opening the lock by recording a sound of a turning key

Scientists from the National University of Singapore have published a…

Ukrainian Cyber Police and Binance

Ukrainian cyber police in cooperation with Binance detained operators of 20 cryptocurrency exchangers

Since January 2020, the Ukrainian cyber police began cooperating with…

Microsoft will stop supporting IE

Microsoft developers will stop supporting classic Edge and IE 11

Microsoft said it would stop supporting classic Edge and IE…

Vulnerabilities in Amazon Alexa

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

In June this year, researchers from Check Point discovered a…

ReVoLTE attack on LTE networks

ReVoLTE attack allows overhearing other people’s conversations in LTE networks

Experts from the Ruhr University and New York University in…

AI Assistant

Hello! 👋 How can I help you today?