The Security Blog From Gridinsoft

3CX Software Falls Victim To Supply Chain Attack

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver…

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges Binance sound threatening. CFTC, the U.S. regulator of commodity futures…

The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows

Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel…

Malicious ChatGPT Add-On Hijack Facebook Accounts

ChatGPT became a worldwide phenomenon in recent months. GPT-4 update created even more hype around it, bringing it on top…

BlackGuard Receives Update, Targets More Cryptowallets

BlackGuard, a prolific infostealer malware, received an update at the edge of 2023. The new update introduced advanced data-stealing capabilities…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently…

Google Unveiled Tsunami Code

Google Unveiled a Source Code for Tsunami Vulnerability Scanner

Google has unveiled the source code for the Tsunami scanner,…

AI Assistant

Hello! 👋 How can I help you today?