The Security Blog From Gridinsoft

Google Command and Control

Chinese Hackers Use Google Command & Control Capabilities in Attacks

Google experts have warned that the Chinese “government” hack group APT41 is abusing the red team’s GC2 (Google Command and…

Legion Hacker Tool Used to Steal Data from Poorly Protected Websites

Experts have discovered a Python-based Legion hacking tool that is sold via Telegram and is used as a way to…

LockBit Releases World’s First macOS Ransomware

LockBit, an infamous ransomware gang that became a major threat actor over the last two years, released the variant of…

Domino Backdoor is Lead by FIN7 and Conti Actors

A new Domino Backdoor popped out at the beginning of 2023. Since February, a new malware family coined Domino is…

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894…

SpiKey allows opening lock

SpiKey technique allows opening the lock by recording a sound of a turning key

Scientists from the National University of Singapore have published a…

Ukrainian Cyber Police and Binance

Ukrainian cyber police in cooperation with Binance detained operators of 20 cryptocurrency exchangers

Since January 2020, the Ukrainian cyber police began cooperating with…

Microsoft will stop supporting IE

Microsoft developers will stop supporting classic Edge and IE 11

Microsoft said it would stop supporting classic Edge and IE…

Vulnerabilities in Amazon Alexa

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

In June this year, researchers from Check Point discovered a…

ReVoLTE attack on LTE networks

ReVoLTE attack allows overhearing other people’s conversations in LTE networks

Experts from the Ruhr University and New York University in…

Mozilla downsizing security professionals

Mozilla Downsizing Affects Security Professionals

Earlier this week, Mozilla fired 250 employees, and another 60…

Citrix expects attacks on XenMobile

Citrix expects attacks on fresh issues in XenMobile

Citrix engineers released a number of Citrix Endpoint Management patches…

HIBP opens source code

HIBP (Have I Been Pwned?) leak aggregator opens the source code

Founder of Have I Been Pwned? (HIBP) Troy Hunt announced…

Kr00k threatens Qualcomm and MediaTek

Kr00k problem threatens devices with Qualcomm and MediaTek Wi-Fi chips

In early 2020, ESET experts spoke about the Kr00k vulnerability…

Intel investigates data leak

Intel investigates data leak: 20 GB of source codes and documents

Swiss programmer Till Kottmann has been studying various dumps in…

Chrome extensions injected ads

295 Chrome extensions injected ads in search results

AdGuard analysts have identified 295 malicious extensions in the Chrome…

AI Assistant

Hello! 👋 How can I help you today?