El blog de seguridad de Gridinsoft

Azov ransomware sets up analysts and tries to show up as pro-Ukrainian

Azov Ransomware Tries to Set Up Cybersecurity Specialists

ransomware azov, un recién llegado al mercado de malware de cifrado, aparece a la vista con una estrategia bastante inusual. This malware seems

Raspberry Robin Worm Operators Now Trade Access

Los investigadores de Microsoft informaron que los operadores del grupo de piratería, que rastrean bajo el ID DEV-0950, used the Clop

The Updated Fodcha Botnet Reaches a Capacity of 1 Tb / s and Demands a Ransom Directly in DDoS Packets

Qihoo 360 (360 netlab) Los expertos advierten sobre la aparición de una versión actualizada de la botnet Fodcha., which embeds

OpenSSL Fixes First Critical Vulnerability Since 2016

Los desarrolladores del proyecto OpenSSL han informado a los usuarios que la próxima versión 3.0.7 will close a recently discovered critical

Microsoft Links Hacker Group Vice Society to Several Ransomware Campaigns

Los expertos de Microsoft han publicado un informe sobre el grupo de hackers Vice Society (también conocido como DEV-0832), which uses ransomware to attack the

Experts confirmed LiveJournal leak.

Experts confirm data leak of 26 million LiveJournal users

a mediados de mayo 2020, in the Telegram channel of the head

Discord as a tool for stealing password

Hackers use Discord as a tool for stealing passwords

The Bleeping Computer magazine warns that the new version of

Sarwent Opens RDP Ports

Sarwent malware opens RDP ports on infected machines

SentinelOne experts noticed that the new version of the Sarwent

Qatar spyware containing COVID-19

Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic

As part of the fight against the spread of coronavirus

GitLab checked employees on phishing

GitLab checked its employees: on phishing got every fifth

Recientemente, the GitLab platform conducted a security audit, analyzing if

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (PARECE) equipo…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Agencia de Ciberseguridad y Protección de Infraestructuras (CISA), part of the US