The Security Blog From Gridinsoft

ChatGPT and malicious packages

Hackers Can Use ChatGPT Hallucinations to Distribute Malicious Packages

According to vulnerability and risk management company Vulcan Cyber, attackers can manipulate ChatGPT to distribute malicious packages to software developers.…

Microsoft Researchers Link Clop Gang to MOVEit Transfer Attack

Microsoft has linked the Clop ransomware gang to a recent attack that uses a zero-day vulnerability in the MOVEit Transfer…

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level…

The AI-Controlled Drone Did Not “Kill” Its Operator Even During the Simulation. At Least for Now

At the recent Future Combat Air and Space Capabilities summit, the head of AI testing and operations at the US…

Russian Hacker Sells Terminator Tool That Is Allegedly Able to Bypass Any Antivirus Programs

A tool called Terminator appeared on one of the Russian hacker forums, and, according to its author, can destroy any…

Colonial Pipeline paid criminals

Colonial Pipeline CEO Confirms that Company Paid Criminals $4.4M

The head of Colonial Pipeline confirmed that the company paid…

vaccine against Russian hackers

Cyrillic on the keyboard may become a “vaccine” against Russian hackers

After the sensational cyberattack on the American fuel giant Colonial…

patches for Frag Attacks problems

Manufacturers release patches for Frag Attacks problems

Manufacturers of various Wi-Fi-enabled equipment and software developers for this…

XSS Banned Ransomware Ads

Hacker XSS Forum Banned Ransomware Ads

The administration of the popular hacker forum XSS (formerly DaMaGeLab)…

vulnerability in the universal Turing machine

Scientist discovered a vulnerability in the universal Turing machine

Pontus Johnson, a professor at the Royal Institute of Technology…

Wi-Fi Devices and Frag Attacks

Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues

The well-known information security expert Mathy Vanhoef reported the discovery…

cyberattacks on water supply systems

FBI investigates cyberattacks on two water supply systems in Pennsylvania

Last month, the local Water Action Response Network, which includes…

Qualcomm Mobile Station Modem

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world…

Chrome 90 security feature

Chrome 90 gets new security feature to protect against attacks on Windows 10

Google has introduced a new Windows 10 security feature called…

Adobe flash player

Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021

According to manufacturers’ elaborate plan, since beginning of 2021 support…

bypasses Specter protection

New Micro-op Cache Attack Bypasses Specter Protection

A team of researchers from the Universities of Virginia and…

GitHub review exploit policy

GitHub Developers Review Exploit Posting Policy Due to Recent Scandal

The GitHub developers review the exploit posting policy and want…