The Security Blog From Gridinsoft

Yanluowang hacker group

Logs of Internal Chats of the Russian Hacker Group Yanluowang Leaked to the Network

Information security experts report a hack of the Yanluowang hacker group, which compromised Cisco this summer. According to experts, internal…

Emotet Botnet Resumed Activity after Five Months of Inactivity

The Emotet botnet resumed activity and began sending out malicious spam again after a five-month break, during which the malware…

OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical

At the end of October, OpenSSL developers warned that the upcoming update to version 3.0.7 would close a critical vulnerability.…

Azov Ransomware Tries to Set Up Cybersecurity Specialists

Azov ransomware, a newcomer to the encryption malware market, appears in view with a rather unusual strategy. This malware seems…

Raspberry Robin Worm Operators Now Trade Access

Microsoft researchers reported that the operators of the hack group, which they track under the ID DEV-0950, used the Clop…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of…

Linus Torvalds approved the exclusion

Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code

More recently, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has exploded the service for monitoring and aggregating leaks DataViper and has already put on sale over 8 thousand company databases…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently more than 15 billion stolen logins and passwords, including more than 5 billion unique credentials, on the black market (hacker…

Google Unveiled Tsunami Code

Google Unveiled a Source Code for Tsunami Vulnerability Scanner

Google has unveiled the source code for the Tsunami scanner, a scalable solution for detecting dangerous vulnerabilities with a minimum of false positives. The scanner is aimed at large corporate…

Mozilla Suspended Firefox Send

Mozilla suspended Firefox Send service due to abuse and malware

Journalists from ZDNet drew attention of Mozilla engineers to numerous abuses of the Firefox Send service, which was actively used to distribute the malware. Mozilla temporarily suspended the Firefox Send…

Algorithm for protection against deepfakes

Scientists have introduced a new algorithm for protection against deepfakes

Scientists from Boston University have introduced a new algorithm for protection against deepfakes. Their filter modifies pixels so that videos and images become unsuitable for making fakes. With the development…

black hat - not neutral enough

Google vice president says “black hat” is not a neutral term

Journalists from ZDNet noticed that during the weekend there was a hot discussion in the information security community due to the “lack of neutrality” of the term black hat. The…

Attackers hack Roblox accounts

Attackers hack Roblox accounts and urge to vote for Trump

According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…

every 142nd password is “123456”

The researcher found that every 142nd password is “123456”

Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…

dangerous vulnerability in PAN-OS

US cyber command warned about dangerous vulnerability in PAN-OS

The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…

hackers exploit the BLM theme

Check Point: hackers exploit BLM theme for attacks

Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…