The Security Blog From Gridinsoft

CodeRAT Source code

Developer of CodeRAT Trojan Releases Source Code

The source code for the CodeRAT remote access trojan has been published on GitHub. This happened after the security researchers…

Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp

Experts from eSentire established that the infrastructure used to hack Cisco in May 2022 was exploited to compromise an unnamed…

The Japanese Government Decided to Fight the Use of … Floppy Disks

As it turns out, more than 1,900 administrative procedures in Japan still require the use of floppy disks. Now, the…

Malware Hides in Images from the James Webb Telescope

Securonix researchers have noticed an interesting malware campaign that distributes a malware called GO#WEBBFUSCATOR written in Go. Hackers use phishing…

Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics

According to a new report from Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack…

ToTok turned out to be a tracking tool

ToTok messenger turned out to be a tool for total tracking

The New York Times reported that the ToTok messenger turned…

Perfect encryption system presented

Perfect encryption system presented by team of scientists from three countries

An international team of scientists from the University of St.…

MyKingz uses Taylor Swift

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, also known as…

Password meter services risk

Password meter services put Internet users at risk

Password meter services, implemented on many popular platforms, can be…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ:…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers…

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

On July 18, 2018, the European Commission announced that it…

Smoke Loader Malware

Smoke Loader Malware: New Password-Stealing Infection Method

A new variant of the Smoke Loader malware has been…

Windows 8.1 ☠️ The End of Support

Windows 8.1 ☠️ The End of Support

First, it’s important to understand that Microsoft ended support for…

Top 10 the most dangerous viruses of all time

Top 10 Deadliest Virus in

Computer viruses are really similar to real-life ones. They can…

prevent data breaches

MongoDB Data Breaches

One of the biggest breaches of databases happened recently –…