The Security Blog From Gridinsoft

Generate Ad Traffic

42,000 Sites Generate Ad Traffic Pretending to Be Famous Brands

The Chinese group Fangxiao has built a huge network of 42,000 websites that pose as well-known brands (including Coca-Cola, McDonald’s,…

MSIL/Microsoft.Bing.A Detection (BingWallpaper.exe)

A lot of users on different forums complain about MSIL/Microsoft.Bing.A detection in ESET antivirus. This detection points to BingWallpaper.exe file…

Ukrainian Cyber Police and Europol Arrested Fraudsters Involved in Fake Investments

The Ukrainian cyber police and Europol have arrested five members of an international network of fraudsters, whose income is estimated…

KmsdBot malware combines DDoS-attacks and coin mining

A new malware, called KmsdBot, strikes user devices. The Akamai SIRT has discovered a new malware that uses the SSH…

Attackers Hacked 15,000 Websites to Poison SEO

Sucuri analysts have discovered a massive hacking campaign in which the attackers hacked about 15,000 sites, mostly running WordPress. Let…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in…

Firefox Refuses to Support FTP

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an…

Ransomware attacks occur at night

Ransomware attacks most often occur at night and on weekends

According to a report published by the American company FireEye,…

Snoop steals data from Intel processors

Snoop attack steals data from Intel processors

Amazon Web Services (AWS) software engineer Pawel Wieczorkiewicz discovered another…

Microsoft stopped RDCMan development

Microsoft stopped RDCMan development due to a bug

Microsoft has stopped development of the Remote Desktop Connection Manager…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as…

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recently, I wrote all about the vulnerabilities of Intel and…

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called…

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for…

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

According to a study by Which company, more than 40%…

700 problematic Microsoft subdomains

Researchers found about 700 problematic Microsoft subdomains

Vullnerability researchers found about 700 problematic Microsoft subdomains and captured…

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious…