The Security Blog From Gridinsoft

Malware to bypass protection

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of…

ParseThru Vulnerability Threatens Go-Based Applications

Researchers have discovered a vulnerability called ParseThru — the bug affects Go-based products and can be abused to gain unauthorized…

BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator

The operators of the BlackCat ransomware (aka ALPHV) claimed responsibility for hacking Creos Luxembourg, which operates a gas pipeline and…

Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer

An infamous STOP/Djvu ransomware adopted a new spreading tactic. According to the report of Avast Threat Labs, a malware intelligence…

Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows…

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

On July 18, 2018, the European Commission announced that it had fined Google €4.3 billion for violating EU competition rules. The fine was imposed after an investigation revealed that Google…

Smoke Loader Malware

Smoke Loader Malware: New Password-Stealing Infection Method

A new variant of the Smoke Loader malware has been discovered that uses a new method to infect computers. Smoke Loader is a sophisticated malware that has been around since…

Windows 8.1 ☠️ The End of Support

Windows 8.1 ☠️ The End of Support

First, it’s important to understand that Microsoft ended support for Windows 8.1 on January 9th, 2018. This means that the operating system will no longer receive security updates, bug fixes,…

What is Trojan.CoinMiner csrss.exe

What is Trojan CoinMiner csrss.exe?

Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…

Top 10 the most dangerous viruses of all time

Top 10 Deadliest Virus in

Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…

prevent data breaches

Once More About MongoDB Data Breaches

One of the biggest breaches of databases happened recently – personal information on nearly 50 thousand users was stolen and replaced by random files with instructions on how to get…

Top-6 biggest tech failures of 2016

Top-6 biggest tech failures of 2016

Samsung Galaxy Note 7 The biggest failure of Samsung for all history is Galaxy Note 7. Smartphones started exploding, that caused a stoppage in production and users were forbidden from…