The Security Blog From Gridinsoft

Ukrainian law enforcers arrested

Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts

Ukrainian law enforcers reported that they “neutralized” and arrested hackers from a cybercriminal group operating from Lviv. The group specialized…

Scammers Use Fake Dating Sites to Steal Money

Experts from ReasonLabs have discovered an unusual malicious scheme that has been operating since 2019 – carders used fake dating…

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub warns that a large-scale phishing campaign aimed at users began on September 16: scammers send emails with fake notifications…

LockBit 3.0 Builder leaked to the public

On September 21, 2022, a new Twitter user Ali Qushji published what is supposed to be a LockBit Ransomware builder.…

Gamaredon Hack Group Uses New Malware to Attack Ukrainian Organizations

Cisco Talos analysts write that the Russian-speaking hack group Gamaredon (aka Primitive Bear, Shuckworm, IronTiden and Callisto) is attacking Ukrainian…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free…

Winnti attacked Hong Kong universities

Winnti hacking group attacked Hong Kong universities

ESET experts found that during protests that began back in…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic…

REvil (Sodinokibi) working methods

IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators

Information security specialists of the Danish provider KPN applied sinkholing…

Airports use vulnerable sites

97 of the 100 largest airports use vulnerable sites and web applications

Specialists from the Swiss company ImmuniWeb conducted an analysis of…

Microsoft open Windows 7 source code

Free Software Foundation encourages Microsoft to open Windows 7 source code

Admit that are you already tired of the news about…

Citrix Releases New Patches

Citrix releases new patches, racing with the hackers that install encryptors on vulnerable machines

Destructive race: Citrix releases new patches, and hackers are actively…

Windows 7 - End of Life

Windows 7 users will not receive a patch for critical vulnerability in the IE

Microsoft said Windows 7 users would not receive a patch…