O blog de segurança da Gridinsoft

Ex-Conti Members Work for Akira Ransomware Gang

Conti Members Are Back in Action as Part of Akira Ransomware

Especialistas estão investigando atividade do grupo de ransomware Akira, que comprometeu pelo menos 63 organizações desde março 2023, majoritariamente…

The Second Exploit in Ivanti EPMM in a Week

Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact

Predasus Malware Attacks Latin America Through Browser Plugins

Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Os invasores tiveram como alvo instituições financeiras, sites de reserva, and instant

GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users

Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(deitar) no módulo Ubuntu OverlayFS. Essas vulnerabilidades…

Google Is Working on an Information Security Project Called Web Integrity API

Uma equipe de quatro engenheiros do Google está trabalhando em um novo projeto chamado Web Environment Integrity API, which will

auto parts manufacturer attacked

Auto Parts Manufacturer Attacked by Three Different Ransomware in Two weeks

Sophos experts told about an interesting case when an unnamed

Microsoft fixed DogWalk

Microsoft fixes DogWalk bug as part of Patch Tuesday

A Microsoft corrigiu mais de 120 vulnerabilidades este mês, incluindo o…

LOLI Stealer malware

IS Specialists Discovered a New Version of Malware from Russian Hackers LOLI Stealer

Cyble Research Labs specialists found a sample of malware in

Slack resets user passwords

Slack Is Resetting User Passwords Due to a Bug

Os desenvolvedores do Slack notificaram sobre 0.5% of users that they

Twilio phishing attack

Twilio Falls Victim To Phishing Attack

Twilio, a tech giant from San Francisco, became a victim

Malware to bypass protection

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

VirusTotal analysts presented a report on the methods that malware

ParseThru and Go Vulnerability

ParseThru Vulnerability Threatens Go-Based Applications

Researchers have discovered a vulnerability called ParseThru — the bug

BlackCat and Creos Luxembourg

BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator

Os operadores do ransomware BlackCat (também conhecido como ALPHV) claimed responsibility

STOP DJVU Ransomware

Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer

Um infame ransomware STOP/Djvu adotou uma nova tática de propagação. De acordo com…

Raspberry Robin and Evil Corp

Microsoft Links Raspberry Robin Worm to Evil Corp

Os analistas da Microsoft notaram que o corretor de acesso, which the

DSIRF linked to Knotweed

The Austrian Company DSIRF Was Linked to the Knotweed Hack Group and the Subzero Malware

Microsoft has been told that the Knotweed hack group is

similarities between LockBit and BlackMatter

Experts Find Similarities Between LockBit and BlackMatter

Cybersecurity researchers have confirmed similarities between the latest iteration of