El blog de seguridad de Gridinsoft

Research Discover 9 Vulnerabilities in EDK II

9 PixieFail Vulnerabilities Discovered in TianoCore’s EDK II

una cadena de 9 vulnerabilidades en el entorno de ejecución previo al arranque de UEFI (PXE), apodado PixieFail, fue descubierto en una investigación reciente. Como…

New Google Chrome 0-day Vulnerability Exploited, Update Now

En las notas de la versión más reciente, Google reports about a new 0-day vulnerability that is already exploited in the wild.

Novice FBot Stealer Targets Cloud Services

Los investigadores informan sobre una nueva cepa de malware denominada FBot. This Python-based malicious program appears to be a unique tool in

AzorUlt Stealer Is Back In Action, Uses Email Phishing

Los expertos en ciberseguridad se han topado con el malware Azorult de ocho años. Este malware roba información y recopila datos confidenciales, and has been

Remcos RAT Targets South Korean Users Through Webhards

An infamous Remcos RAT reportedly started targeting South Korean users through the files shared on Webhards platform. By baiting users

Massive Freecycle Data Breach Exposes Over 7 Million Customers

7 Million Freecycle Users Exposed In a Massive Data Breach

Freecycle has alerted its users that sensitive information of over

SapphireStealer Review and Analysis

SapphireStealer: Stealthiness, Flexibility and Malware Delivery

SapphireStealer is one such new information stealer to steal various

DarkGate Malware Activity Spikes as Developer Rents Out It

DarkGate Loader Expands Activity, Delivers Ransomware

A new DarkGate malware deployment campaign has caught the attention

Qakbot Botnet Shut Down, Ransomware Attacks Stopped

Qakbot Botnet Hacked, Removed from Over 700,000 Machines

Qakbot, una notoria red de bots, has been taken down by a

Wilko Shopping Scams Hide as Stock Liquidation

Wilko Stock Liquidation Scams – Fake Shopping Sites

Recent events around the Wilko retail chain are sad for

Botnet of 400k Devices Was Used as Proxy Service

Botnet of 400,000 Devices Used as Proxy Nodes Uncovered

Cybercriminals used stealthy malware to create a botnet of 400,000

HiatusRAT Analysis & Recent Attack Description

HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military

Recent attacks on US military systems and Taiwan companies are

Uncovering Cryptocurrency recovery scams

Beware of Cryptocurrency Recovery Scams

Recientemente, the FBI reported increased scammers posing as companies offering

The Season of Back to School Scams

Back to School Scams Expand As August Begins

A medida que se acerca la nueva temporada escolar, scammers target students and

Patch to Ivanti EPMM Vulnerability Is Exploitable

Ivanti EPMM Vulnerability Patch is Vulnerable

Ivanti, the provider of a wide range of management solutions

Phishing Dangers of .zip Domains

Are .zip Domains Safe to Use and Visit?

Internet se ha convertido en nuestro segundo hogar. Every time we

Phishing on Twitter Transition to X

Twitter Blue to X Phishing Breakout

Amid the chaos of Twitter’s transition to the new name