The Security Blog From Gridinsoft

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active installations, at once turned out to have critical SQL injection…

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human…

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for…

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack…

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the ESU program for Windows 7. The OS version released back…

Patch for 0-day in Internet Explorer

Temporary patch for 0-day vulnerability in Internet Explorer arrived on the Internet

Earlier this week, Microsoft announced about vulnerability in Internet Explorer,…

Government hackers attacked often

Government hackers attacked companies more often in 2019

Organizations are more likely to become victims of state-sponsored cybercriminals.…

Hacker patches Citrix servers

Unknown hacker patches vulnerable Citrix servers

Recently, in the public domain appeared exploits for the critical…

Greta Thunberg in phishing campaigns

Greta Thunberg became the most popular character in phishing campaigns

Check Point analysts prepared a traditional monthly report on the…

Farewell Windows 7 updates

Microsoft released farewell updates for Windows 7 and Windows Server 2008

On January 14, 2020, Microsoft stopped supporting Windows 7 for…

Fancy Bear attacked Burisma

Fancy Bear Attacked Ukrainian Oil And Gas Burisma Company

Fancy Bear, also known as APT28, orchestrated an attack on…

Cable Haunt Threats Broadcom

Cable Haunt Vulnerability Threats Millions of Modems with Broadcom Chips

Danish researchers have published a report on the Cable Haunt…

Researcher remotely hacked iPhone

Researcher remotely hacked iPhone using only one vulnerability

Researcher in a few minutes remotely hacked iPhone using only…

Researchers hacked TikTok app

Researchers hacked TikTok app via SMS

Check Point experts found many issues in one of the…

Homeland Security and Iran cyberattacks

US Homeland Security warns of possible cyberattacks by Iran

Homeland Security USA issued a warning about possible acts of…

Shitcoin Wallet for Google Chrome

Shitcoin Wallet for Google Chrome steals cryptocurrency passwords and keys

One of the extensions for Google Chrome, Shitcoin Wallet injects…

AI Assistant

Hello! 👋 How can I help you today?