The Security Blog From Gridinsoft
Logs of Internal Chats of the Russian Hacker Group Yanluowang Leaked to the Network
Information security experts report a hack of the Yanluowang hacker group, which compromised Cisco this summer. According to experts, internal…
Emotet Botnet Resumed Activity after Five Months of Inactivity
The Emotet botnet resumed activity and began sending out malicious spam again after a five-month break, during which the malware…
OpenSSL Patches Released and Critical Vulnerability Turns Out to be Not So Critical
At the end of October, OpenSSL developers warned that the upcoming update to version 3.0.7 would close a critical vulnerability.…
Azov Ransomware Tries to Set Up Cybersecurity Specialists
Azov ransomware, a newcomer to the encryption malware market, appears in view with a rather unusual strategy. This malware seems…
Raspberry Robin Worm Operators Now Trade Access
Microsoft researchers reported that the operators of the hack group, which they track under the ID DEV-0950, used the Clop…
On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities
As part of the July update Tuesday, Microsoft engineers fixed 123 vulnerabilities in 13 different products. Any of them was under attack. In July did not reach the record of…
Linus Torvalds approved exclusion of the terms slave, blacklist and others from the Linux kernel code
More recently, we talked that the IT community has also returned to discussing inappropriate and offensive terminology under the influence of Black Lives Matter protests that swept across the United…
NightLion hacker claims to have hacked DataViper information security company
A hacker, hiding under the pseudonym NightLion, claims that has exploded the service for monitoring and aggregating leaks DataViper and has already put on sale over 8 thousand company databases…
Analysts say that over 5 billion unique credentials can be found on the black market
Analysts at Digital Shadows have estimated that there are currently more than 15 billion stolen logins and passwords, including more than 5 billion unique credentials, on the black market (hacker…
Google Unveiled a Source Code for Tsunami Vulnerability Scanner
Google has unveiled the source code for the Tsunami scanner, a scalable solution for detecting dangerous vulnerabilities with a minimum of false positives. The scanner is aimed at large corporate…
Mozilla suspended Firefox Send service due to abuse and malware
Journalists from ZDNet drew attention of Mozilla engineers to numerous abuses of the Firefox Send service, which was actively used to distribute the malware. Mozilla temporarily suspended the Firefox Send…
Scientists have introduced a new algorithm for protection against deepfakes
Scientists from Boston University have introduced a new algorithm for protection against deepfakes. Their filter modifies pixels so that videos and images become unsuitable for making fakes. With the development…
Google vice president says “black hat” is not a neutral term
Journalists from ZDNet noticed that during the weekend there was a hot discussion in the information security community due to the “lack of neutrality” of the term black hat. The…
Attackers hack Roblox accounts and urge to vote for Trump
According to the ZDNet publication, unknown attackers hack Roblox accounts and leave a message “Ask your parents to vote for Trump this year! #MAGA2020 ” in about 1800 users’ profiles…
The researcher found that every 142nd password is “123456”
Ata Hakçıl, a Turkish student and independent researcher, has done a great job examining over a billion different usernames and passwords. The researcher found that every 142nd password is “123456”.…
US cyber command warned about dangerous vulnerability in PAN-OS
The US cyber command warned that in PAN-OS was discovered a dangerous vulnerability and that soon government hack groups are likely to start using it. PAN-OS is an operating system…
Check Point: hackers exploit BLM theme for attacks
Check Point analysts reported that hackers are actively exploiting the BLM (Black Lives Matter) theme for attacks and noted increase in the activity of cybercriminals, connecting it with weakening of…