The Security Blog From Gridinsoft

exploit for vulnerability in GoAnywhere MFT

Hackers Published an Exploit for a Dangerous Vulnerability in GoAnywhere MFT

Hackers published on the network an exploit for a zero-day vulnerability that is actively used in the GoAnywhere MFT administration…

ESXiArgs Ransomware Launches Massive Attacks on VMware ESXi Servers

Hosting providers and the French CERT warn that more than 3,200 VMware ESXi servers were compromised by the new ESXiArgs…

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming…

Dangerous RCE Vulnerability in GTA Online Fixed

Rockstar Games has finally released a patch for a dangerous RCE vulnerability in GTA Online that allowed loss of game…

Cryptocurrency Scam “Pig Butchering” Penetrated the Apple App Store and Google Play Store

The Pig Butchering scam, a scam operation that specializes in fake investments in allegedly promising cryptocurrency projects, stocks, bonds, futures…

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS…

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (ZDI) team…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division…

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and…

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app…

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay…

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Cybersecurity and Infrastructure Protection Agency (CISA), part of the US…

LiveJournal users data

To the network leaked data of 33.7 million LiveJournal users

In the Telegram channel of the head of DeviceLock company…

Hackers attacked Stadler

Hackers attacked Swiss company Stadler that produces trains

Hackers attacked the company Stadler. A well-known Swiss train manufacturer…

Botnet Cereals downloaded anime

For eight years, the Cereals botnet existed for only one purpose: it downloaded anime

The Cereals IoT botnet appeared in 2012, and reached its…

Fresenius attacked with Snake ransomware

Europe’s largest private hospital operator Fresenius attacked with Snake ransomware

Fresenius, Europe’s largest private hospital operator and major provider of…

Jio disclosed COVID-19 data

Techno giant Jio disclosed data of people tested for COVID-19

Recently, India’s technology giant Jio, partly acquired by Facebook, has…