The Security Blog From Gridinsoft

Hack Group Winter Vivern

Russian-Speaking Hack Group Winter Vivern Attacks Governments in Europe and Asia

The Russian-speaking hack group Winter Vivern (aka TA473 in the Proofpoint classification) has been actively exploiting a vulnerability in Zimbra…

APT43 Funds Cybercrime With Stolen Crypto

Researchers have identified a new state-backed hacker group in North Korea. The group in question is the North Korean hacker…

Ransomware Actors Target IBM’s Aspera Faspex

File transfer utility Aspera Faspex, developed by IBM, became a riding mare of cybercriminals. A vulnerability discovered in the past…

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver…

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges Binance sound threatening. CFTC, the U.S. regulator of commodity futures…

Flipper Zero hits Kickstarter

Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned

Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required…

Outage of Garmin services

Ransomware attack caused Garmin’s four-day services outage

Earlier this week, manufacturer of electronics and navigation equipment Garmin…

five vulnerabilities in D-Link routers

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Loginsoft experts have reported about five serious vulnerabilities found in…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed…

AI Assistant

Hello! 👋 How can I help you today?