The Security Blog From Gridinsoft

bypass ChatGPT restrictions

Hackers Are Promoting a Service That Allows Bypassing ChatGPT Restrictions

Check Point researchers say that the OpenAI API is poorly protected from various abuses, and it is quite possible to…

TrickBot Members Sanctioned By U.S. and UK

US and UK law enforcements imposed sanctions against 7 members of a cybercrime gang that stands after TrickBot malware, including…

Hackers Published an Exploit for a Dangerous Vulnerability in GoAnywhere MFT

Hackers published on the network an exploit for a zero-day vulnerability that is actively used in the GoAnywhere MFT administration…

ESXiArgs Ransomware Launches Massive Attacks on VMware ESXi Servers

Hosting providers and the French CERT warn that more than 3,200 VMware ESXi servers were compromised by the new ESXiArgs…

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming…

Phishing sites use SSL

Almost three quarters of modern phishing sites use SSL

Anti-Phishing Working Group (APWG) experts in their new report on…

IMP4GT Vulnerability Threats Smartphones

IMP4GT Vulnerability in LTE Threatens Almost All Modern Smartphones

Experts from Ruhr University reported an IMP4GT (IMPersonation Attacks in…

WhatsApp Groups Indexes Google

Google Search Indexes WhatsApp Private Groups

Google search engine indexes invitations to WhatsApp groups (including links…

WhatsApp Phishing URLs

Number of linked with WhatsApp phishing URLs increased by 13 467%

According to Vade Secure’s report, the number of phishing URLs…

FSF sent to Microsoft HDD

FSF sent Microsoft developers an empty HDD for Windows 7 sources

The Free Software Foundation (FSF) sent Microsoft developers an empty…

Samsung amends Android kernel

Samsung amends Android kernel that impair security

Jann Horn, Google Project Zero Specialist, studied the Android kernel,…

Xhelper Trojan remains on device

Xhelper Trojan remains on the device even after resetting to factory settings

Xhelper malware continues to infect Android devices. Moreover, the Xhelper…

Microsoft recommends disabling SMBv1

Microsoft recommends Exchange administrators to disable SMBv1

Microsoft strongly recommends administrators disable the SMBv1 protocol on Exchange…

0-day vulnerability in Internet Explorer

Microsoft fixed 0-day vulnerability in Internet Explorer and 99 more bugs in its products

Recent February “update Tuesday” became the largest for Microsoft in…

Increase of supply chains attacks

FBI warned about increase of supply chains attacks

The FBI has warned private sector companies of an active…

Trojan Emotet spread via Wi-Fi

Trojan Emotet is trying to spread through available Wi-Fi networks

Binary Defense analysts noticed that the new version of the…

Dangerous Vulnerability in Citrix Software

Dangerous vulnerability in Citrix software is still not resolved in 20% of companies

A month after the publication of information about a dangerous…

AI Assistant

Hello! 👋 How can I help you today?