The Security Blog From Gridinsoft
Most Often, Malware to Bypass Protection Impersonates Skype, Adobe Acrobat and VLC
VirusTotal analysts presented a report on the methods that malware operators use to bypass protection and increase the effectiveness of…
ParseThru Vulnerability Threatens Go-Based Applications
Researchers have discovered a vulnerability called ParseThru — the bug affects Go-based products and can be abused to gain unauthorized…
BlackCat Says It Attacked Creos Luxembourg, European Gas Pipeline Operator
The operators of the BlackCat ransomware (aka ALPHV) claimed responsibility for hacking Creos Luxembourg, which operates a gas pipeline and…
Djvu Ransomware Spreads via Discord, Carrying RedLine Stealer
An infamous STOP/Djvu ransomware adopted a new spreading tactic. According to the report of Avast Threat Labs, a malware intelligence…
Microsoft Links Raspberry Robin Worm to Evil Corp
Microsoft analysts have noticed that the access broker, which the company tracks as DEV-0206, is using the Raspberry Robin Windows…
ToTok messenger turned out to be a tool for total tracking
The New York Times reported that the ToTok messenger turned out to be a tracking tool. The application allowed the UAE authorities to track conversations, movements and other data of…
Perfect encryption system presented by team of scientists from three countries
An international team of scientists from the University of St. Andrews (Scotland), the King Abdullah University of Science and Technology (Saudi Arabia) and the Center for Alternative Scientific Processes (USA)…
MyKingz botnet uses Taylor Swift photo to infect target machines
Sophos researchers noticed that the MyKingz botnet, also known as Smominru, DarkCloud, and Hexmen, now uses steganography to infect targeted machines. For these purposes, the criminals chose a JPG file…
Password meter services put Internet users at risk
Password meter services, implemented on many popular platforms, can be misleading, thereby putting users at risk of cyberattacks. During the holiday season, hundreds of millions of people will receive gadgets…
Check Point named the most dangerous malware of November 2019
Check Point Research Team, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity solutions provider, published the Global Threat Index report, listing the most dangerous malware of November 2019.…
France are looking for LockerGoga ransomware developers in Ukraine
French law enforcement agencies are looking in Ukraine for developers who used LockerGoga ransomware to attack more than 1,200 industrial enterprises around the world. According to the French police, some…
An attacker in a WhatsApp group chat could disable messengers of other participants
Do you like chatting in groups of interest? Are you smiling or shivering when in a group chat from your child’s kindergarten or school class new messages arrive? You are…
Google Fined Record €4.3 Billion for Abusing Dominance in Smartphone Market
On July 18, 2018, the European Commission announced that it had fined Google €4.3 billion for violating EU competition rules. The fine was imposed after an investigation revealed that Google…
Smoke Loader Malware: New Password-Stealing Infection Method
A new variant of the Smoke Loader malware has been discovered that uses a new method to infect computers. Smoke Loader is a sophisticated malware that has been around since…
Windows 8.1 ☠️ The End of Support
First, it’s important to understand that Microsoft ended support for Windows 8.1 on January 9th, 2018. This means that the operating system will no longer receive security updates, bug fixes,…
What is Trojan CoinMiner csrss.exe?
Csrss.exe (also known as Client Service Runtime Process) is a legitimate and vital process of Microsoft Windows OS. The genuine csrss.exe file is located in “C:\Windows\System32\” and it is normal…
Top 10 Deadliest Virus in
Computer viruses are really similar to real-life ones. They can infect thousands of PCs in just one hour, so we can call it an epidemic. Agreed, it is exciting to…