The Security Blog From Gridinsoft

FraudGPT Founds Application in Phishing Emails

FraudGPT Offers Phishing Email Generation to Cybercriminals

It’s not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that…

Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will specialize in “sophisticated technical attacks on AI systems.” Among examples…

Information Security Threats in Social Media

Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its…

Ivanti 0-day exploited to target Norwegian government

Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability that allowed authentication bypass. This vulnerability had a…

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead…

hack group Earth Lusca

Cybersecurity researchers discovered Chinese hack group Earth Lusca

According to a Trend Micro report, the Chinese cyber-espionage hack…

The Facebook Pixel Hunt

The Facebook Pixel Hunt

Mozilla, a browser maker, these days introduced its collaboration with…

WhisperGate wiper

Microsoft discovered the WhisperGate wiper attacking Ukrainian users

Microsoft says it discovered a destructive attack on Ukrainian users…

hackers defaced government websites

Most likely russian hackers defaced Ukrainian government websites

Hackers defaced several Ukrainian government websites: the attack occurred on…

remote access to Tesla cars

Teen gets remote access to 25 Tesla cars

19-year-old David Colombo said on Twitter that he gets remote…

critical vulnerability in Office

Critical vulnerability in Office fixed, but macOS update is delayed

As part of the January Patch Tuesday, Microsoft engineers fixed…

Vulnerability in macOS

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to…

Spy NoReboot Method

Spy method NoReboot allows simulating iPhone shutdown and prying through the camera

The NoReboot spy method allows intercepting the iPhone restart and…

Aquatic Panda exploits Log4Shell

Chinese hack group Aquatic Panda exploits Log4Shell to hack educational institutions

Specialists of information security company CrowdStrike warn: the Chinese cyber-espionage…

Volvo Cars under Snatch attack

Volvo Cars under Snatch attack

In its press release, Volvo Cars, a Swedish multinational luxury…

Magnat campaigns delivering fake installers

Magnat campaigns delivering fake installers

Cyber security specialists warn of the Magnat malicious distribution waves…

2easy trading platform

The 2easy trading platform is gaining popularity on the darknet

KELA analysts say that the 2easy trading platform is gaining…

AI Assistant

Hello! 👋 How can I help you today?