The Security Blog From Gridinsoft

OAuth2 Vulnerability Allows for Persistent Session Hijacking

OAuth2 Session Hijack Vulnerability: Details Uncovered

A sophisticated exploit targeting Google’s OAuth2 authentication system was uncovered by Prisma threat actor. This exploit leverages undocumented functionalities within…

xDedic Marketplace Members Detained In International Operations

The infamous xDedic Marketplace, known for its illicit trade in compromised computers and personal data, has been effectively dismantled. 19…

Verified X/Twitter Accounts Hacked to Spread Cryptoscams

The trend of hacking official accounts to promote cryptocurrency fraud is gaining momentum. Over the past week, researchers have discovered…

SMTP Smuggling is a New Threat to Email Security

A new SMTP Smuggling technique reportedly has the potential to bypass existing security protocols. Also it can enable attackers to…

Mandiant Account in X Hacked to Spread Cryptocurrency Scams

The Twitter account of Google’s Mandiant cybersecurity service has been hacked to promote a cryptocurrency scam. It happens along with…

damage from cyberattacks in 2022

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI’s Internet Fraud Complaint Center (IC3) has released its…

North Korean hackers

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their…

Silicon Valley Bank Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers,…

Emotet has resumed activity

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and…

Acronis Breach Exposes Internal Company Data

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery…

vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…

Bing chatbot scammer

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded…

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach…

BlackLotus UEFI Bootkit

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is…

What is Beep Malware?

New stealthy “Beep” malware focuses heavily on evading detection

Cybercriminals periodically develop something new. Sometimes it is an updated…

LastPass Breach Is Bigger Than It Was Expected

LastPass Breach Investigation Goes On, Things are Even Worse

LastPass, owned by GoTo (formerly LogMeIn) and with over 30…

YouTube and Pixel smartphones

YouTube Video Causes Pixel Smartphones to Reboot

Users have found that Pixel smartphones powered by Google Tensor…