O blog de segurança da Gridinsoft
Seven Common Types of Malware – Analysis & Description
No intrincado cenário da segurança cibernética, comprehending the various forms of malware is crucial. This article offers an in-depth look…
DLL Search Order Hijacking Technique Bypasses Protection
Uma nova DLL (Biblioteca de links dinâmicos) Surgiu uma variante de sequestro de pedido de pesquisa. This method capitalizes on executables in the trusted WinSxS…
Microsoft Disables MSIX App Installer Protocol
Microsoft reportedly disabled MSIX installer protocol in Windows, devido à sua exploração em ataques cibernéticos do mundo real. Hackers found a way to…
Novice Rugmi Loader Delivers Various Spyware
The threat landscape meets a new player – Carregador Rugmi. Esta ameaça é especializada em espalhar spyware, e é de fato…
Xamalicious Trojan Hits Over 327K Android Devices
Um novo backdoor para Android, apelidado de Xamalicious, foi descoberto pelos pesquisadores no limite de 2023. This malware exhibits potent…
Snappy Tool Helps Avoid Fraudulent Wi-Fi Hotspots
Trustwave has created a Snappy tool that will make it…
RustBucket Malware Attacks MacOS More Effectively
Nova atualização do RustBucket Malware introduziu várias mudanças. Now the…
Akira Ransomware Decryptor Is Available To The Public
Cybersecurity experts have released a decryptor for the Akira ransomware.…
Russian Hacker Project DDoSIA Grew by Multiple Times
Analysts of the Sekoia company reported that the Russian DDoSia…
RedEnergy Stealer-as-a-Ransomware On The Rise
Researchers have discovered a new form of malware called RedEnergy…
Hackers Actively Exploit the 0-Day Vulnerability in the Ultimate Member WordPress Plugin
Hackers actively exploit a zero-day vulnerability in the WordPress plugin…
BlackCat Ransomware Employs Malvertising In Targeted Attacks
Recently malicious actors started using malvertising to spread BlackCat ransomware.…
MITRE Compiled a List of the 25 Most Dangerous Bugs
Os especialistas do MITRE publicaram uma lista dos 25 most…
The Number of Companies Affected by Attacks on Vulnerabilities in MOVEit Transfer Increased
The consequences of exploiting a 0-day vulnerability in MOVEit Transfer’s…
8Base Ransomware Group On The Rise, Lists a Number of Victims
Em junho deste ano, a new wave of cyber-attacks…
PindOS JavaScript Dropper Distributes Bumblebee and IcedID Malware
Deep Instinct specialists spoke about a new JavaScript dropper called…
Chinese Hackers Accidentally Infected European Hospital with Malware
Check Point analysts found that Chinese hackers in a chain…