O blog de segurança da Gridinsoft

CodeRAT Source code

Developer of CodeRAT Trojan Releases Source Code

O código-fonte do trojan de acesso remoto CodeRAT foi publicado no GitHub. This happened after the security researchers

Cisco Hack Is Linked to Russian-Speaking Hackers from Evil Corp

Especialistas da eSentire estabeleceram que a infraestrutura usada para hackear a Cisco em maio 2022 was exploited to compromise an unnamed

The Japanese Government Decided to Fight the Use of … Floppy Disks

Acontece que, mais do que 1,900 procedimentos administrativos no Japão ainda exigem o uso de disquetes. Agora, o…

Malware Hides in Images from the James Webb Telescope

Os pesquisadores da Securonix notaram uma interessante campanha de malware que distribui um malware chamado GO#WEBBFUSCATOR escrito em Go. Hackers use phishing

Hackers Are Now More Likely to Attack Not Large Hospitals, but Specialized Clinics

De acordo com um novo relatório da Critical Insight, hackers are increasingly targeting small healthcare companies and specialized clinics that lack

Patch for 0-day in Internet Explorer

Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet

No início desta semana, Microsoft announced about vulnerability in Internet Explorer,…

Government hackers attacked often

Government hackers attacked companies more often in 2019

Organizations are more likely to become victims of state-sponsored cybercriminals.

Hacker patches Citrix servers

Unknown hacker patches vulnerable Citrix servers

Recentemente, in the public domain appeared exploits for the critical

Greta Thunberg in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

Em janeiro 14, 2020, Microsoft parou de oferecer suporte ao Windows 7 para…

Fancy Bear attacked Burisma

Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company

Urso chique, also known as APT28, orchestrated an attack on

Cable Haunt Threats Broadcom

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt

Researcher remotely hacked iPhone

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only

Researchers hacked TikTok app

Researchers hacked TikTok app via SMS

Check Point experts found many issues in one of the

Homeland Security and Iran cyberattacks

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security USA issued a warning about possible acts of

Shitcoin Wallet for Google Chrome

Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

Uma das extensões para Google Chrome, Shitcoin Wallet injects