O blog de segurança da Gridinsoft

Integris Health Patient Complain About Extortion Emails

Integris Health Hacked, Patients Receive Ransom Emails

Integris Saúde, A mais extensa rede de saúde sem fins lucrativos de Oklahoma, foi vítima de um ataque cibernético sofisticado, que comprometeu dados de pacientes suscetíveis. Esse…

Carbanak is Back with a New Spreading Tactic

O grupo de crimes cibernéticos Carbanak, famoso por seu malware bancário, ressurgiu com novas táticas de ransomware, marking a significant evolution in

What are Crypto Draining Attacks? Signs & Mitigation

Entre uma grande variedade de possíveis golpes que envolvem criptomoedas, crypto draining attacks stand in their volume and amount of

UAC-0099 Targets Ukrainian Companies With Lonepage Malware

Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its cyber espionage campaign against Ukrainian firms. Leveraging a

FalseFont Malware Targets Defence Contractors Worldwide

O grupo de hackers iraniano APT33 desenvolveu um novo malware chamado FalseFont. They use it to target the Defense Industrial

Fake Super Mario Game Spreads Umbral Stealer

Super Mario Malware: Hackers Spread Stealers in the Fake Game

The Super Mario video game franchise has gained immense acclaim

Reset MFA in LastPass

LastPass Users Can’t Login to App after Resetting MFA

Desde Maio 2023, users of the LastPass password manager have

RepoJacking and GitHub attacks

RepoJacking Attacks Could Threaten Millions of GitHub Repositories

Aqua researchers believe that millions of repositories on GitHub are

Condi malware builds a botnet

Condi Malware Builds a Botnet from TP-Link Routers

Em maio 2023, um novo malware Condi, focused on DDoS

ChatGPT Accounts Are Compromised by Stealer Malware

Over 100k ChatGPT Accounts Are For Sale on the Darknet

De acordo com um novo relatório, durante o ano passado, sobre…

APT28 attacked Ukrainian organizations

APT28 Attacked Ukrainian and Polish Organizations

Futuro Registrado, em colaboração com investigadores do CERT-UA, has unveiled a

Freaky Leaky SMS

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Os pesquisadores criaram um ataque de canal lateral chamado “SMS com vazamento estranho”,…

Credentials Theft & Emails Scams - How to Protect?

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and

Keys for Windows 11 Pro

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google

NortonLifeLock Hacked Via MOVEit Vulnerability

NortonLifeLock Hacked by Cl0P Gang, Using MOVEit Vulnerability

NortonLifeLock, o mundialmente famoso desenvolvedor de software antivírus, had reportedly been hacked

Shuckworm attacks Ukrainian companies

Shuckworm Gang Attacks Ukrainian Companies Using Pterodo Backdoor and USB Drives

Especialistas da Symantec relatam que o grupo de hackers Shuckworm (também conhecido como Armagedom,…

Cloud Mining Scams Spread Roamer, the Android banking trojan

Cloud Mining Scams Spread Banking Trojans

It’s no secret that cybercriminals are increasingly using mobile platforms