The Security Blog From Gridinsoft

White Phoenix Decryptor Gets an Online Version

White Phoenix Decryptor by CyberArk Updated With Web Interface

CyberArk has released an online version of a file decryptor. This is a simplified, web version of the “White Phoenix”…

GitLab Vulnerability CVE-2024-0402 Exposes File Overwrite Risk

In a new security update, GitLab has issued a patch for a critical vulnerability. This flaw could allow unauthorized users…

4 Junos OS Vulnerabilities Fixed, Update Now

In the latest security bulletin, Juniper Networks announced the release of fixes for a selection of vulnerabilities in their Junos…

Panda Security Driver Vulnerabilities Uncovered in APT Simulation

Security researchers discovered critical security driver vulnerabilities in Panda Security software. This chain of flaws abuses legitimate drivers to disable…

Kasseika Ransomware Exploits Vulnerable Antivirus Drivers

A new ransomware called “Kasseika” uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kasseika…

Other people's chats in ChatGPT

ChatGPT Users Complained about Seeing Other People’s Chat Histories

Some ChatGPT users have reported on social media that their…

Breached Forums are Not Accessible

BreachForums is down. Things got worse?

Recently, one of BreachForums administrators nicknamed PomPomPurin was arrested by…

SmartScreen Vulnerability Allows to Bypass Security Checks

New Microsoft SmartScreen Bypass Technique Causes Concerns

Microsoft SmartScreen proved to be an effective way of approving…

damage from cyberattacks in 2022

The FBI Said That the Damage from Cyberattacks in 2022 Exceeded $10 Billion

The FBI’s Internet Fraud Complaint Center (IC3) has released its…

North Korean hackers

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their…

Silicon Valley Bank Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers,…

Emotet has resumed activity

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and…

Acronis Breach Exposes Internal Company Data

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery…

vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…

Bing chatbot scammer

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded…

Acer Falls Victim To Another Breach

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach…

AI Assistant

Hello! 👋 How can I help you today?