The Security Blog From Gridinsoft

CAPTCHA in Discord and AI

CAPTCHA in Discord Asks Users to Find Non-Existent Objects Created by AI

Users complain that the Discord CAPTCHA provided by hCaptcha forces them to look for non-existent objects created by AI in…

GitLab Releases Patch to Critical Vulnerability

GitLab, one of the most famous code repositories in the world, faces critical security issues in the latest update. Aside…

GoDaddy Refund Phishing Emails Spread Infostealer

Hackers started using GoDaddy Refund Emails as a disguise to trick the users into installing malware. In order to deploy…

Philadelphia Inquirer is Struck by Cuba Ransomware

The Philadelphia Inquirer, Philadelphia’s largest newspaper by circulation and third-longest-running newspaper in the USA, suffered a cyberattack on May 15,…

FIN7 Hack Group Resumed Activity, Linked to Clop Ransomware

Microsoft analysts report that last month the notorious hacker group FIN7 (also known as Carbanak, Navigator and others) resumed its…

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest…

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing…

Using DTLS amplify DDoS

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers…

hackers have access to missile

REvil spokesman boasts that hackers have access to ballistic missile launch systems

A Revil representative under the pseudonym Unknown, claims that the…

One-Click ProxyLogon Fix

Microsoft Introduces One-Click ProxyLogon Fix Tool

Microsoft developers have released a tool called EOMT (Exchange On-premises…

Google PoC exploit for Specter

Google experts published PoC exploit for Specter that is targeting browsers

Google engineers published a PoC exploit to demonstrate the effectiveness…

GitHub removed the ProxyLogon exploit

GitHub removed ProxyLogon exploit and has been criticized

The administration of the GitHub service has removed a real…

PoC exploit for ProxyLogon vulnerabilities

Researcher Published PoC Exploit for ProxyLogon Vulnerabilities in Microsoft Exchange

An independent information security researcher from Vietnam has presented a…

Hackers gained access to cameras

Hackers gained access to surveillance cameras in Tesla, Cloudflare and banks

Bloomberg reports that some hackers have gained access to surveillance…

Dogecoin scam: send credentials and pay $300

Dogecoin scam: send credentials and pay $300

Dogecoin scam is just a part of the online fraud…

Hackers attacked Microsoft Exchange

Hackers attacked Microsoft Exchange servers of the European Banking Authority

Hackers attacked the servers of the Microsoft Exchange European Banking…

Expert intercepted windows.com traffic

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains…