The Security Blog From Gridinsoft

Hackers use Excel add-ins

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began…

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads to distribute malware to users who are looking for popular…

Hackers Stole Data from the LastPass Use Password Vault

LastPass password manager developers have reported that hackers who recently broke into the company’s cloud storage have accessed it and…

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection and seeks to confuse security experts if it runs in…

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from attacks using malicious Trojanized Windows 10 installers, as victims download…

Microsoft Exchange Servers Vulnerable

82.5% of Microsoft Exchange servers are still vulnerable

Information security experts from Rapid7 reported that more than 35,000…

Access to cameras on Mac and iPhone

Vulnerabilities allowed access to cameras on Mac, iPhone and iPad

Apple paid $75,000 to the IS researcher Ryan Pickren in…

Increased number of "coronavirus" cyberattacks

The number of “coronavirus” cyberattacks increased to 5,000 per day

Check Point experts estimated that the number of “coronavirus” cyberattacks…

PoC exploits for SMBGhost vulnerability

Specialists published PoC exploits for SMBGhost vulnerability

The March “Tuesday of updates” did not include a patch…

Tesla vulnerable to DoS attacks

IS researcher found that the Tesla Model 3 interface is vulnerable to DoS attacks

Researcher Jacob Archuleta, known on the network under the pseudonym…

RDP and VPN usage grew

Due to pandemic, RDP and VPN usage grew by 41% and 33%

Amid of the COVID-19 pandemic, the use of remote access…

Dharma ransomware source code

Dharma ransomware source code put for sale

ZDNet reports that the source code for one of the…

Rare attack via BadUSB

Attackers exposed the American company to a rare attack via BadUSB

Trustwave experts published a report, in which they said that…

Vulnerabilities in popular password managers

Experts have discovered vulnerabilities in popular password managers

Experts from York University explained how they managed to detect…

Hackers spoof DNS settings

Hackers spoof DNS settings to distribute fake coronavirus applications

Journalists from Bleeping Computer investigated that hackers are replacing DNS…

exploit for Kr00k Wi-Fi vulnerability

Published exploit for Kr00k Wi-Fi vulnerability

In February 2020, information security specialists spoke at the RSA…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in…