The Security Blog From Gridinsoft

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is sold via Telegram and is used as a way to…

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat actor over the last two years, released the variant of…

Domino Backdoor is Lead by FIN7 and Conti Actors

A new Domino Backdoor popped out at the beginning of 2023. Since February, a new malware family coined Domino is…

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894…

SoftServe has been attacked by a ransomware

Ukraine’s largest IT company SoftServe has been attacked by a ransomware

One of the largest IT companies in Ukraine, SoftServe (number…

KryptoCibule malware steals cryptocurrency

KryptoCibule malware steals cryptocurrency from Windows users

ESET specialists discovered the KryptoCibule malware, which has been active…

Shlayer bypassed Apple checks

Shlayer malware bypassed Apple security checks

Security expert Peter Dantini discovered that the Shlayer malware bypassed…

not enter PIN code for VISA

Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards

Scientists from the Swiss Higher Technical School of Zurich have…

Twitter and Graphika neutralized Dracula

Twitter and Graphika neutralized Dracula propaganda botnet

Experts from the Graphika research group talked about how they…

malicious plugin for 3Ds Max

Hackers use in attacks malicious plugin for 3Ds Max

Bitdefender experts have discovered a hacker group that is attacking…

SpiKey allows opening lock

SpiKey technique allows opening the lock by recording a sound of a turning key

Scientists from the National University of Singapore have published a…

Ukrainian Cyber Police and Binance

Ukrainian cyber police in cooperation with Binance detained operators of 20 cryptocurrency exchangers

Since January 2020, the Ukrainian cyber police began cooperating with…

Microsoft will stop supporting IE

Microsoft developers will stop supporting classic Edge and IE 11

Microsoft said it would stop supporting classic Edge and IE…

Vulnerabilities in Amazon Alexa

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

In June this year, researchers from Check Point discovered a…

ReVoLTE attack on LTE networks

ReVoLTE attack allows overhearing other people’s conversations in LTE networks

Experts from the Ruhr University and New York University in…

AI Assistant

Hello! 👋 How can I help you today?