The Security Blog From Gridinsoft

Weak block cipher

Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure

WithSecure (formerly F-Secure Business) researchers claim that the content of encrypted messages sent through Microsoft Office 365 can be partially…

Police Swindle Decryption Keys from DeadBolt Ransomware Gang

The Dutch National Police, together with information security specialists from RespondersNU, tricked the operators of the DeadBolt encryptor into giving…

Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies

Radware experts discovered the DDOSIA crowdsourcing DDoS project, in which a Russian-speaking hack group pays volunteers for participation in attacks…

Another 0-Day Bug Was Found in Microsoft Exchange, and LockBit Ransomware Operators Are Exploiting It

Although Microsoft still hasn’t fixed the ProxyNotShell vulnerabilities found in Exchange last month, the company is now investigating a report…

Fake Sites for Adults Destroy User Data

Experts from the Cyble company have discovered a number of fake adult sites that distribute ransomware. However, a detailed analysis…

Algorithm for protection against deepfakes

Scientists have introduced a new algorithm for protection against deepfakes

Scientists from Boston University have introduced a new algorithm for protection against deepfakes. Their filter modifies pixels so that videos and images become unsuitable for making fakes. With the development…

black hat - not neutral enough

Google vice president says “black hat” is not a neutral term

Journalists from ZDNet noticed that during the weekend there was a hot discussion in the information security community due to the “lack of neutrality” of the term black hat. The…

Attackers hack Roblox accounts

Attackers hack Roblox accounts and urge to vote for Trump

According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…

every 142nd password is “123456”

The researcher found that every 142nd password is “123456”

Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…

dangerous vulnerability in PAN-OS

US cyber command warned about dangerous vulnerability in PAN-OS

The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…

hackers exploit the BLM theme

Check Point: hackers exploit BLM theme for attacks

Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…

Lucifer malware uses exploits

Lucifer malware uses many exploits, is engaged in mining and DDoS attacks

Palo Alto Networks experts have prepared a report on Lucifer malware, which uses many exploits and, according to experts, “wreaks havoc” on Windows hosts. It is noted that the authors…

Evil Corp with WastedLocker Ransomware

Evil Corp returns to criminal activity with WastedLocker ransomware

Fox-IT experts talked about the latest activity of the famous hacker group Evil Corp. According to analysts, the group came back to life in January of this year and conducted…

Hackers force to solve CAPTCHA

Hackers force users to solve CAPTCHA

Microsoft analysts have discovered a malicious campaign, in which hackers force users to solve CAPTCHA before they gain access to malicious content in an Excel document. This file contains macros…

AMD SMM Callout bugs

AMD plans to fix SMM Callout bugs in its processors by the end of June

AMD reports that firmware updates will be released for three bugs called SMM Callout by the end of June 2020. These vulnerabilities allow attackers to establish control over the AMD…

EBay organized persecution of bloggers

eBay employees organized persecution and intimidation of a family of bloggers

Six former eBay employees became involved in a strange trial. According to the investigation, eBay employees organized the persecution and intimidation of a couple of bloggers from the city of…

Chrome spyware installation campaign

Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps the largest spyware campaign for installing spyware in Google Chrome. As part of the campaign, criminals registered thousands of domains…