O blog de segurança da Gridinsoft

Leaked LockBit builder

Hack Group Bl00Dy Is Already Using Leaked LockBit Builder

Os pesquisadores descobriram que o jovem grupo de ransomware Bl00Dy já está usando o construtor LockBit em seus ataques, which leaked

Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com

O Sentinel One descobriu que o grupo de hackers norte-coreano Lazarus tem como alvo seletivo os usuários do macOS. Attackers are using fake

Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts

As autoridades ucranianas relataram que “neutralizaram” e prenderam hackers de um grupo cibercriminoso que operava em Lviv. The group specialized

Scammers Use Fake Dating Sites to Steal Money

Especialistas do ReasonLabs descobriram um esquema malicioso incomum que está em operação desde 2019 – carders used fake dating

Hackers Use CircleCI Fake Notifications to Access GitHub Accounts

GitHub avisa que uma campanha de phishing em grande escala dirigida a usuários começou em setembro 16: scammers send emails with fake notifications

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recentemente, I wrote all about the vulnerabilities of Intel and

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

De acordo com um estudo da Qual empresa, more than 40%

700 problematic Microsoft subdomains

Researchers found about 700 problematic Microsoft subdomains

Pesquisadores de vulnerabilidade descobriram sobre 700 problematic Microsoft subdomains and captured

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious

Chinese Coronavirus Detection App

Chinese coronavirus detection app transmits data to the police

Mês passado, Chinese authorities released the Alipay Health Code coronavirus

Epiq Global cyberattack

Cyberattack with the use of ransomware forced Epiq Global to shut down its systems

Epiq Global, um grande escritório de advocacia internacional, tornou-se o…

Facebook OAuth Vulnerability

Vulnerability in OAuth Protocol Allows Hacking Any Facebook Account

A vulnerabilidade está contida no recurso de login do Facebook, qual…

Hackers Scan Microsoft Exchange

Hackers scan network for vulnerable Microsoft Exchange servers

Especialistas em segurança da informação alertam que os hackers já estão escaneando o…

Kr00k Wi-Fi Chips Vulnerability

Kr00k Wi-Fi-chips vulnerability affects over a billion devices

Na RSA 2020 conferência, Os especialistas da ESET falaram sobre o…