The Security Blog From Gridinsoft

open source cryptor Cryptonite

Open-Source Cryptor Cryptonite Became a Wiper due to a Bug

Fortinet researchers studied the recently appeared open-source cryptor Cryptonite, distributed for free on GitHub. It turned out that the creator…

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software…

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car…

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators…

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as…

0-day vulnerability in Internet Explorer

Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products

Recent February “update Tuesday” became the largest for Microsoft in…

Increase of supply chains attacks

FBI warned about increase of supply chains attacks

The FBI has warned private sector companies of an active…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.…

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of…

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free…

Winnti attacked Hong Kong universities

Winnti hacking group attacked Hong Kong universities

ESET experts found that during protests that began back in…

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic…

REvil (Sodinokibi) working methods

IS specialists studied working methods of the REvil (Sodinokibi) ransomware operators

Information security specialists of the Danish provider KPN applied sinkholing…

Airports use vulnerable sites

97 of the 100 largest airports use vulnerable sites and web applications

Specialists from the Swiss company ImmuniWeb conducted an analysis of…

Microsoft open Windows 7 source code

Free Software Foundation encourages Microsoft to open Windows 7 source code

Admit that are you already tired of the news about…