The Security Blog From Gridinsoft

Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC

VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of…

ParseThru Vulnerability Threatens Go-Based Applications

Researchers have discovered a vulnerability called ParseThru — the bug affects Go-based products and can be abused to gain unauthorized…

BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator

The operators of the BlackCat ransomware (aka ALPHV) claimed responsibility for hacking Creos Luxembourg, which operates a gas pipeline and…

Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer

An infamous STOP/Djvu ransomware adopted a new spreading tactic. According to the report of Avast Threat Labs, a malware intelligence…

Microsoft Links Raspberry Robin Worm to Evil Corp

Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows…

ToTok turned out to be a tracking tool

ToTok messenger turned out to be a tool for total tracking

The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of…

Perfect encryption system presented

Perfect encryption system presented by team of scientists from three countries

An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA)…

MyKingz uses Taylor Swift

MyKingz botnet uses Taylor Swift photo to infect target machines

Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…

Password meter services risk

Password meter services put Internet users at risk

Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…

The most dangerous malware of November 2019

Check Point named the most dangerous malware of November 2019

Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…

LockerGoga developers looking in Ukraine

France are looking for LockerGoga ransomware developers in Ukraine

French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…

Message disable WhatsApp chat

An attacker in a WhatsApp group chat could disable messengers of other participants

Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market

On July 18, 2018, the European Commission announced that it had fined Google €4.3 billion for violating EU competition rules. The fine was imposed after an investigation revealed that Google…

Smoke Loader Malware

Smoke Loader Malware: New Password-Stealing Infection Method

A new variant of the Smoke Loader malware has been discovered that uses a new method to infect computers. Smoke Loader is a sophisticated malware that has been around since…

Windows 8.1 ☠️ The End of Support

Windows 8.1 ☠️ The End of Support

First, it’s important to understand that Microsoft ended support for Windows 8.1 on January 9th, 2018. This means that the operating system will no longer receive security updates, bug fixes,…

What is Trojan.CoinMiner csrss.exe

What is Trojan CoinMiner csrss.exe?

Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…

Top 10 the most dangerous viruses of all time

Top 10 Deadliest Virus in

Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…