The Security Blog From Gridinsoft

Silicon Valley Bank Scams

Incoming Silicon Valley Bank Related Scams

Mind-bending globe-scale events always attract a lot of attention. Newsmakers, politicians and simple rubbernecks pay a lot of attention to…

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and after a three-month “rest” began to send malicious spam again.…

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery services for hacked companies was breached earlier this month. The…

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to…

five vulnerabilities in D-Link routers

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Loginsoft experts have reported about five serious vulnerabilities found in…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently…

AI Assistant

Hello! 👋 How can I help you today?