The Security Blog From Gridinsoft

APT28 attacked Ukrainian organizations

APT28 Attacked Ukrainian and Polish Organizations

Recorded Future, in collaboration with CERT-UA researchers, has unveiled a recent cyber offensive orchestrated by Russian-speaking hackers affiliated with the…

Freaky Leaky SMS: Message Delivery Report Can Be Used to Determine the Location of the Recipient

Researchers have created a side-channel attack called “Freaky Leaky SMS”, which allows finding out the location of the recipient of…

Credentials Theft is On The Rise

Email spam has become the prevalent form of phishing and malware spreading for a long time. Among them, credentials theft…

ChatGPT and Google Bard Generate Keys for Windows 10/11

Users have discovered a way to force ChatGPT and Google Bard to generate working keys for Windows 11 Pro and…

NortonLifeLock Hacked by Cl0P Gang, Using MOVEit Vulnerability

NortonLifeLock, the world-famous antivirus software developer, had reportedly been hacked by the Cl0p ransomware gang. Hackers listed it on their…

ransomware REvil attacked Acer

REvil ransomware operators attacked Acer and demand $50,000,000

The REvil ransomware attacked the Taiwanese company Acer (the sixth-largest…

The Russian pleaded guilty

Russian who tried to hack Tesla was pleaded guilty

The Russian, who offered a Tesla specialist $1,000,000 for installing…

Using DTLS amplify DDoS

DTLS can amplify DDoS by 37 times

Netscout warns that using of the DTLS vector allows hackers…

hackers have access to missile

REvil spokesman boasts that hackers have access to ballistic missile launch systems

A Revil representative under the pseudonym Unknown, claims that the…

One-Click ProxyLogon Fix

Microsoft Introduces One-Click ProxyLogon Fix Tool

Microsoft developers have released a tool called EOMT (Exchange On-premises…

Google PoC exploit for Specter

Google experts published PoC exploit for Specter that is targeting browsers

Google engineers published a PoC exploit to demonstrate the effectiveness…

GitHub removed the ProxyLogon exploit

GitHub removed ProxyLogon exploit and has been criticized

The administration of the GitHub service has removed a real…

PoC exploit for ProxyLogon vulnerabilities

Researcher Published PoC Exploit for ProxyLogon Vulnerabilities in Microsoft Exchange

An independent information security researcher from Vietnam has presented a…

Hackers gained access to cameras

Hackers gained access to surveillance cameras in Tesla, Cloudflare and banks

Bloomberg reports that some hackers have gained access to surveillance…

Dogecoin scam: send credentials and pay $300

Dogecoin scam: send credentials and pay $300

Dogecoin scam is just a part of the online fraud…

Hackers attacked Microsoft Exchange

Hackers attacked Microsoft Exchange servers of the European Banking Authority

Hackers attacked the servers of the Microsoft Exchange European Banking…

Expert intercepted windows.com traffic

Expert intercepted windows.com traffic using bitsquatting

An independent expert known as Remy discovered that Microsoft domains…

AI Assistant

Hello! 👋 How can I help you today?