El blog de seguridad de Gridinsoft

former eBay executives

Judge Sentences Former eBay Executives to Jail Terms for Harassing Bloggers

La semana pasada, two former eBay executives were sentenced to prison terms for harassing a blogger couple who posted unflattering articles

Hack Group Witchetty Hides Malware in the Windows Logo

Investigadores de Symantec han descubierto una campaña maliciosa del grupo de hackers Witchetty, which uses steganography to hide malware in an

Hack Group Bl00Dy Is Already Using Leaked LockBit Builder

Los investigadores han descubierto que el joven grupo de ransomware Bl00Dy ya utiliza en sus ataques el constructor LockBit, which leaked

Lazarus Hackers Attack MacOS Users by impersonating Crypto[.]com

Sentinel One ha descubierto que el grupo de hackers norcoreano Lazarus se dirige selectivamente a los usuarios de macOS. Attackers are using fake

Ukrainian Law Enforcers Arrested Hackers Who Sold More Than 30 million Accounts

Las autoridades ucranianas informaron que "neutralizaron" y arrestaron a piratas informáticos de un grupo cibercriminal que operaba desde Lviv.. The group specialized

Snoop steals data from Intel processors

Snoop attack steals data from Intel processors

Servicios web de Amazon (AWS) software engineer Pawel Wieczorkiewicz discovered another

Microsoft stopped RDCMan development

Microsoft stopped RDCMan development due to a bug

Microsoft ha detenido el desarrollo del Administrador de conexión a Escritorio remoto…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recientemente, I wrote all about the vulnerabilities of Intel and

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

Según un estudio de Qué empresa, more than 40%

700 problematic Microsoft subdomains

Researchers found about 700 problematic Microsoft subdomains

Los investigadores de vulnerabilidad encontraron aproximadamente 700 problematic Microsoft subdomains and captured

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious

Chinese Coronavirus Detection App

Chinese coronavirus detection app transmits data to the police

El mes pasado, Chinese authorities released the Alipay Health Code coronavirus

Epiq Global cyberattack

Cyberattack with the use of ransomware forced Epiq Global to shut down its systems

Epiq Global, una gran firma de abogados internacional, has become the

Facebook OAuth Vulnerability

Vulnerability in OAuth Protocol Allows Hacking Any Facebook Account

La vulnerabilidad está contenida en la función de inicio de sesión de Facebook., cual…