O blog de segurança da Gridinsoft

North Korean Group Lazarus

North Korean Group Lazarus Attacks Energy Companies

Uma nova campanha de malware do grupo de hackers norte-coreano Lazarus foi descoberta, which was active from February to

MooBot Botnet Attacks D-Link Routers

Especialistas descobriram que o botnet MooBot, baseado no malware Mirai IoT, attacks vulnerable D-Link routers using a combination

The New Shikitega Malware Is Very Difficult to Detect and Eliminate

NO&T researchers have discovered a new Linux stealth malware called Shikitega that targets computers and IoT devices and uses privilege

SharkBot Malware Infiltrates Google Play Store Again

Especialistas em segurança da informação da Fox IT descobriram dois aplicativos na Google Play Store que distribuem o Trojan SharkBot: Mister

Developer of CodeRAT Trojan Releases Source Code

O código-fonte do trojan de acesso remoto CodeRAT foi publicado no GitHub. This happened after the security researchers

Samsung amends Android kernel

Samsung amends Android kernel that impair security

Jann Horn, Especialista em Projeto Zero do Google, estudou o kernel do Android,…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

O malware Xhelper continua a infectar dispositivos Android. Além disso, the Xhelper

Microsoft recommends disabling SMBv1

Microsoft recommends Exchange administrators to disable SMBv1

Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange

0-day vulnerability in Internet Explorer

Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products

Recent February “update Tuesday” became the largest for Microsoft in

Increase of supply chains attacks

FBI warned about increase of supply chains attacks

The FBI has warned private sector companies of an active

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous

Lemon Duck Malware

Lemon Duck malware operators attack IoT vendors

TrapX Security company experts warned about a new malicious campaign.

Dangerous vulnerabilities in WhatsApp

Dangerous vulnerabilities in WhatsApp allowed compromising millions of users

Security researcher Gal Weizman from PerimeterX disclosed technical details of

Cybercriminals use pirated software

Cybercriminals increasingly use pirated software to deliver backdoors and ransomware

Cybersecurity experts once again warn that while pursuing for free

Winnti attacked Hong Kong universities

Winnti hacking group attacked Hong Kong universities

ESET experts found that during protests that began back in

Authorities can hack iPhone

US authorities can hack iPhone, but may have difficulties with Android

Although the US authorities are persistent in waging a “cryptographic