The Security Blog From Gridinsoft

North Korean hackers

North Korean Hackers Attack Cybersecurity Specialists by Offering Them Jobs via LinkedIn

Mandiant experts noticed that North Korean hackers have focused their attention and attacks on information security specialists. Attackers try to…

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers, politicians and simple rubbernecks pay a lot of attention to…

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and after a three-month “rest” began to send malicious spam again.…

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery services for hacked companies was breached earlier this month. The…

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…

Microsoft will stop supporting IE

Microsoft developers will stop supporting classic Edge and IE 11

Microsoft said it would stop supporting classic Edge and IE…

Vulnerabilities in Amazon Alexa

Vulnerabilities in Amazon Alexa opened access to user data for outsiders

In June this year, researchers from Check Point discovered a…

ReVoLTE attack on LTE networks

ReVoLTE attack allows overhearing other people’s conversations in LTE networks

Experts from the Ruhr University and New York University in…

Mozilla downsizing security professionals

Mozilla Downsizing Affects Security Professionals

Earlier this week, Mozilla fired 250 employees, and another 60…

Citrix expects attacks on XenMobile

Citrix expects attacks on fresh issues in XenMobile

Citrix engineers released a number of Citrix Endpoint Management patches…

HIBP opens source code

HIBP (Have I Been Pwned?) leak aggregator opens the source code

Founder of Have I Been Pwned? (HIBP) Troy Hunt announced…

Kr00k threatens Qualcomm and MediaTek

Kr00k problem threatens devices with Qualcomm and MediaTek Wi-Fi chips

In early 2020, ESET experts spoke about the Kr00k vulnerability…

Intel investigates data leak

Intel investigates data leak: 20 GB of source codes and documents

Swiss programmer Till Kottmann has been studying various dumps in…

Chrome extensions injected ads

295 Chrome extensions injected ads in search results

AdGuard analysts have identified 295 malicious extensions in the Chrome…

11 0-day vulnerabilities identified

Google: 11 0-day vulnerabilities identified in the first half of 2020

Google Project Zero experts estimate that 11 0-day vulnerabilities, actively…

Garmin paid ransom to the WastedLocker

Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators

In July 2020, Garmin, the manufacturer of wearable electronics and…