The Security Blog From Gridinsoft

YouTube and Pixel smartphones

YouTube Video Causes Pixel Smartphones to Reboot

Users have found that Pixel smartphones powered by Google Tensor processors are rebooting when user is trying to watch a…

The Researcher Hacked His Own Bank Account by Imitating a Voice with AI

The journalist Vice Motherboard Joseph Cox hacked the bank account by imitating a voice with the help of AI, which…

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…

Hackers Broke into Activision’s Slack and Stole Data

Activision, the publisher of computer games (including the Call of Duty franchise), reported a security breach that occurred back in…

Cybersecurity Experts Discovered a New Stealc Infostealer

ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently…

Google Unveiled Tsunami Code

Google Unveiled a Source Code for Tsunami Vulnerability Scanner

Google has unveiled the source code for the Tsunami scanner,…

Mozilla Suspended Firefox Send

Mozilla suspended Firefox Send service due to abuse and malware

Journalists from ZDNet drew attention of Mozilla engineers to numerous…