The Security Blog From Gridinsoft

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human…

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for…

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack…

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the ESU program for Windows 7. The OS version released back…

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared

Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software Foundation Europe (FSFE), have announced the imminent closure. The fact…

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others

Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car platform, used in cars from other manufacturers (Acura, BMW, Honda,…

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations

The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators have received more than $60 million in ransom from their…

Cyber Spies Use USB Devices to Infect Targets

Cyber Spies Use USB Devices to Infect Targets

Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as the initial penetration vector. The researchers write that they link…

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL

Many Dell, HP and Lenovo devices use old and insecure versions of OpenSSL, as Binarly warns. Let me remind you that we also wrote that OpenSSL Fixes First Critical Vulnerability…

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge Is Used to Spread Malware

TikTok Invisible Challenge became yet another host for threat actors. Crooks found a way to spread the WASP information stealer as a specific utility to revert the in-app filter. Users…

Ragnar Locker Ransomware Accidentally Attacked Belgian Police

Ragnar Locker Ransomware Accidentally Attacked Belgian Police

The operators of the ransomware Ragnar Locker published on their “leak site” the data stolen from the police unit of the Belgian province of Antwerp. The problem is that the…

WhatsApp Hacked, Almost 500 Million Users Exposed

WhatsApp Hacked, Almost 500 Million Users Exposed

On November 28, 2022, information regarding a new WhatsApp breach appeared. The hacker offers a database with stolen data for sale since November 16. The offered pack contains the data…

“Password” Topped the List of the Most Common Passwords in 2022

“Password” Topped the List of the Most Common Passwords in 2022

The NordPass password manager team has prepared annual statistics by analysing the most commonly used and weakest passwords of 2022. Let me remind you that we also wrote that Password…