The Security Blog From Gridinsoft

Condi malware builds a botnet

Condi Malware Builds a Botnet from TP-Link Routers

In May 2023, a new Condi malware, focused on DDoS for hire, appeared. It builds a botnet and conducts attacks…

Over 100k ChatGPT Accounts Are For Sale on the Darknet

According to a new report, over the past year, over 100k ChatGPT users’ accounts have been compromised using malware to…

APT28 Attacked Ukrainian and Polish Organizations

Recorded Future, in collaboration with CERT-UA researchers, has unveiled a recent cyber offensive orchestrated by Russian-speaking hackers affiliated with the…

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Researchers have created a side-channel attack called “Freaky Leaky SMS”, which allows finding out the location of the recipient of…

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and malware spreading for a long time. Among them, credentials theft…

Qualcomm Mobile Station Modem

Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones

More than a third of all smartphones in the world…

Chrome 90 security feature

Chrome 90 gets new security feature to protect against attacks on Windows 10

Google has introduced a new Windows 10 security feature called…

Adobe flash player

Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021

According to manufacturers’ elaborate plan, since beginning of 2021 support…

bypasses Specter protection

New Micro-op Cache Attack Bypasses Specter Protection

A team of researchers from the Universities of Virginia and…

GitHub review exploit policy

GitHub Developers Review Exploit Posting Policy Due to Recent Scandal

The GitHub developers review the exploit posting policy and want…

Hacked OGUsers Forum

Attackers Hacked OGUsers Hacking Forum Again

Recently, the media reported that attackers hacked one of the…

major vulnerability in V8

Google fixed another major vulnerability in the V8 engine

A series of feverish fixes for problems in Google Chrome…

new Apple logo

Criminals threaten to leak new Apple logo, if the company doesn’t pay the ransom

Last week it became known that the operators of the…

Tesla's autopilot without driver

Researchers made Tesla’s autopilot work without a driver

Tesla’s autopilot system can be easily tricked into driving a…

Prometei attacks Microsoft Exchange

Prometei botnet attacks vulnerable Microsoft Exchange servers

Since the patches for ProxyLogon problems were still not installed,…

Moxie Marlinspike and Cellebrite Vulnerabilities

Moxie Marlinspike Demonstrates Cellebrite Tools Vulnerabilities

Signal creator, renowned cryptographer, hacker, researcher and anarchist Moxie Marlinspike…

REvil blackmailing Apple

REvil operators are blackmailing Apple

Media reported that REvil ransomware operators are blackmailing Apple and…

AI Assistant

Hello! 👋 How can I help you today?