The Security Blog From Gridinsoft

Microsoft Will Block Excel XLL Files Downloaded from the Internet

Microsoft Will Block Excel XLL Files Downloaded from the Internet

Microsoft developers are going to block some Excel add-in (.XLL) files for Microsoft 365. The new measures will include automatic…

Ransomware Revenues Dropped by 40% because Victims Refuse to pay

Ransomware revenue (from ransomware attacks) has fallen from $765.6 million in 2021 to $456.8 million in 2022, according to Chainalysis…

Cybersecurity Specialists Advise Players Not to Enter Grand Theft Auto (GTA) Online due to a Dangerous Bug

Players of the PC version of Grand Theft Auto (GTA) Online are alarming as a vulnerability has been discovered in…

Attackers Can Use GitHub Codespaces to Host and Deliver Malware

Trend Micro reports that the GitHub Codespaces cloud development environment, available to the public use since November 2022, can be…

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search Malvertising: Fake Ads of Free Programs in Google Ads

Google Search malvertising is an unpleasant phenomenon of malicious advertisements in search engine results. Ads up there are called to make it easier to find users interested in specific queries,…

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Russian Cybercriminals Seek Access to OpenAI ChatGPT

Check Point analysts have noticed that Russian-speaking hacker forums are actively discussing access to bypass geo-blocking, due to which the OpenAI ChatGPT language model is not available in Russia. We…

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

Goose Goose Duck Game Servers Are DDoS-Attacked Every Day

The free social detective Goose Goose Duck, which recently broke the Among Us record for the number of users simultaneously in the game, is constantly under DDoS attacks. The developers…

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active installations, at once turned out to have critical SQL injection vulnerabilities. In addition, PoC exploits for these bugs are now…

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human voice, relying only on a three-second sound sample. The developers…

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for cryptocurrency mining: hackers bypass CAPTCHA on GitHub. Let me remind…

Hackers compromised Slack private GitHub repositories

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack messenger, published a message about the incident of compromising Slack…

Windows 7 Extended Security Update Program cancelled

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the ESU program for Windows 7. The OS version released back in 2009 now lost all the support from its developer.…

Android Devices Can Be Monitored Using Motion Sensors

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop on Android devices: recognize the gender and identity of the…