The Security Blog From Gridinsoft
Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern
Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human…
Hackers Bypass CAPTCHA on GitHub to Automate Account Creation
The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for…
Hackers compromised Slack private GitHub repositories
On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack…
Windows 7 Extended Security Update Program cancelled
On January 8, 2023, Microsoft announced the cancellation of the ESU program for Windows 7. The OS version released back…
Fosshost, an Open-Source Project Hosting, Is Closing Down as Its Leader Disappeared
Volunteers of the open-source project hosting Fosshost, whose services are used by GNOME, Armbian and Debian, and the Free Software Foundation Europe (FSFE), have announced the imminent closure. The fact…
Application Bugs Allowed to Open and Start Cars Hyundai, Genesis and Others
Experts from Yuga Labs discovered vulnerabilities in mobile applications for Hyundai and Genesis vehicles. In addition, the SiriusXM smart car platform, used in cars from other manufacturers (Acura, BMW, Honda,…
FBI Says Cuba Ransomware ‘Made’ $60 Million by Attacking More Than 100 Organizations
The FBI and the U.S. Infrastructure and Cyber Security Agency (CISA) report that as of August 2022, Cuba ransomware operators have received more than $60 million in ransom from their…
Cyber Spies Use USB Devices to Infect Targets
Mandiant specialists talk about an unusual malware campaign affecting targets in Southeast Asia, when cyber spies use USB devices as the initial penetration vector. The researchers write that they link…
Dell, HP, and Lenovo Devices Use Older Versions of OpenSSL
Many Dell, HP and Lenovo devices use old and insecure versions of OpenSSL, as Binarly warns. Let me remind you that we also wrote that OpenSSL Fixes First Critical Vulnerability…
TikTok Invisible Challenge Is Used to Spread Malware
TikTok Invisible Challenge became yet another host for threat actors. Crooks found a way to spread the WASP information stealer as a specific utility to revert the in-app filter. Users…
Ragnar Locker Ransomware Accidentally Attacked Belgian Police
The operators of the ransomware Ragnar Locker published on their “leak site” the data stolen from the police unit of the Belgian province of Antwerp. The problem is that the…
WhatsApp Hacked, Almost 500 Million Users Exposed
On November 28, 2022, information regarding a new WhatsApp breach appeared. The hacker offers a database with stolen data for sale since November 16. The offered pack contains the data…
“Password” Topped the List of the Most Common Passwords in 2022
The NordPass password manager team has prepared annual statistics by analysing the most commonly used and weakest passwords of 2022. Let me remind you that we also wrote that Password…