The Security Blog From Gridinsoft

ChaosGPT was asked to destroy humanity

Strange Enthusiasts Asked ChaosGPT to Destroy Humanity and Establish World Domination

Enthusiasts launched the ChaosGPT project, based on the open-source Auto-GPT, and AI was given access to Google and asked to…

MSMQ Vulnerability Allows Remote Code Execution

Recent update released by Microsoft, an April Patch Tuesday, revealed a severe vulnerability in Microsoft Message Queueing mechanism. That vulnerability…

Hackers Infect eFile Tax Filing Service with Malware

The eFile service, used by many Americans to file their tax returns and authorized by the US Internal Revenue Service…

Rilide Malware Steals Data from Chromium Browsers

Trustwave SpiderLabs specialists spoke about the new Rilide malware, which steals confidential data and cryptocurrency, targeting Chromium browsers. Basically, Rilide…

Rorschach Ransomware Analysis

Recent research from the CheckPoint Research team revealed a new ransomware sample that can potentially beat all samples currently present…

iPhone hack exploit

Cybersecurity expert created an exploit to hack iPhone via Wi-Fi

Google Project Zero expert Ian Beer has demonstrated an exploit…

phishing emails from delivery services

Operators of phishing campaigns increased number of emails allegedly from delivery services

Check Point Research reports that in November, the number of…

Linus Torvalds and Apple M1

Linus Torvalds doubts that Linux will run on Apple M1

Recently on the Real World Technologies forum Linus Torvalds was…

A new type of cyber-biological attack

Apocalypse Now: experts presented a new type of cyber-biological attack

On Monday, November 30, specialists from the Ben-Gurion University of…

e-commerce sites over WordPress sites

Hackers create scam e-commerce sites over hacked WordPress sites

Akamai specialist Larry Cashdollar discovered a hacker group that uses…

0-day bug in Windows 7

Researcher accidentally found 0-day bug in Windows 7 and Windows Server 2008

French cybersecurity researcher Clément Labro was working on a security…

NATO experimented with deceptive techniques

NATO experimented with deceptive techniques to combat Russian hackers

During a cyber exercise in Estonia on November 16-20, NATO…

How to steal a Tesla Model X

The researcher showed how to steal a Tesla Model X in a few minutes

Information security specialist Lennert Wouters from the Catholic University of…

LidarPhone attack on vacuum cleaner

LidarPhone attack will make your vacuum cleaner spy on you

A group of scientists from the University of Maryland and…

Google services in phishing campaigns

Cybercriminals started using Google services more often in phishing campaigns

Security researchers have reported an increase in cyberattacks using Google…

Change your passwords

Though 2020 is ending, the list of worst passwords is still topes “123456”

The end of the year is approaching, and the developers…

FTP disabled in Chrome 87

Chrome 87 Fixed NAT Slipstream Vulnerability and Disabled FTP Support

Google engineers introduced Chrome 87, in which was disabled FTP…