The Security Blog From Gridinsoft

vulnerability in Microsoft Word

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to…

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good.…

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is sold on hacker forums for about $ 5,000, is indeed…

New stealthy “Beep” malware focuses heavily on evading detection

Cybercriminals periodically develop something new. Sometimes it is an updated version of already known malware, and sometimes it is something…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently…

Google Unveiled Tsunami Code

Google Unveiled a Source Code for Tsunami Vulnerability Scanner

Google has unveiled the source code for the Tsunami scanner,…

Mozilla Suspended Firefox Send

Mozilla suspended Firefox Send service due to abuse and malware

Journalists from ZDNet drew attention of Mozilla engineers to numerous…

Algorithm for protection against deepfakes

Scientists have introduced a new algorithm for protection against deepfakes

Scientists from Boston University have introduced a new algorithm for…

black hat - not neutral enough

Google vice president says “black hat” is not a neutral term

Journalists from ZDNet noticed that during the weekend there was…

Attackers hack Roblox accounts

Attackers hack Roblox accounts and urge to vote for Trump

According to the ZDNet publication, unknown attackers hack Roblox accounts…

every 142nd password is “123456”

The researcher found that every 142nd password is “123456”

Ata Hakçıl, a Turkish student and independent researcher, has done…

dangerous vulnerability in PAN-OS

US cyber command warned about dangerous vulnerability in PAN-OS

The US cyber command warned that in PAN-OS was discovered…

hackers exploit the BLM theme

Check Point: hackers exploit BLM theme for attacks

Check Point analysts reported that hackers are actively exploiting the…

Lucifer malware uses exploits

Lucifer malware uses many exploits, is engaged in mining and DDoS attacks

Palo Alto Networks experts have prepared a report on Lucifer…

Evil Corp with WastedLocker Ransomware

Evil Corp returns to criminal activity with WastedLocker ransomware

Fox-IT experts talked about the latest activity of the famous…

AI Assistant

Hello! 👋 How can I help you today?