The Security Blog From Gridinsoft

SLP Vulnerability Creates New DDoS Opportunities

New SLP Vulnerability Allows 2200x DDoS Amplification

A recently-discovered vulnerability in SLP, a legacy network protocol, can be used for disastrous increasing in DDoS-attack efficiency. As researchers…

Supply Chain Attack Leads to 3CX Hack and Other Supply Chain Attacks

An investigation into a supply chain attack that hit 3CX last month found that the incident was caused by another…

Capita Hacked, Black Basta Gang Publishes Data

Capita, a London-based international business process outsourcing company, was hacked recently. Users noticed strange events in the company earlier this…

Medusa Groups Claims That It “Merged” the Source Code of Bing and Cortana into the Network

Medusa extortionist group claims to have published internal materials stolen from Microsoft, including the source codes of Bing, Bing Maps…

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

XSS vulnerability in Google Maps

Researcher Earned $10,000 by Finding XSS Vulnerability in Google Maps

Israeli cybersecurity specialist Zohar Shachar talked about his discovery of…

money laundered with cryptocurrencies

SWIFT says money is rarely laundered with cryptocurrencies

Specialists of the SWIFT organization, which operates same-named international system…

hackers use NET library

Hackers use .NET library for creating malicious Excel files

Researchers at NVISO Labs noticed that the Epic Manchego group…

Magecart extract card data

Magecart groupings extract stolen cards data via Telegram

An information security specialist known under the pseudonym Affable Kraut…

SoftServe has been attacked by a ransomware

Ukraine’s largest IT company SoftServe has been attacked by a ransomware

One of the largest IT companies in Ukraine, SoftServe (number…

KryptoCibule malware steals cryptocurrency

KryptoCibule malware steals cryptocurrency from Windows users

ESET specialists discovered the KryptoCibule malware, which has been active…

Shlayer bypassed Apple checks

Shlayer malware bypassed Apple security checks

Security expert Peter Dantini discovered that the Shlayer malware bypassed…

not enter PIN code for VISA

Scientists have developed an attack that allows not to enter a PIN code while paying with Visa cards

Scientists from the Swiss Higher Technical School of Zurich have…

Twitter and Graphika neutralized Dracula

Twitter and Graphika neutralized Dracula propaganda botnet

Experts from the Graphika research group talked about how they…

malicious plugin for 3Ds Max

Hackers use in attacks malicious plugin for 3Ds Max

Bitdefender experts have discovered a hacker group that is attacking…

SpiKey allows opening lock

SpiKey technique allows opening the lock by recording a sound of a turning key

Scientists from the National University of Singapore have published a…

AI Assistant

Hello! 👋 How can I help you today?