The Security Blog From Gridinsoft

imitating a voice with AI

The Researcher Hacked His Own Bank Account by Imitating a Voice with AI

The journalist Vice Motherboard Joseph Cox hacked the bank account by imitating a voice with the help of AI, which…

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…

Hackers Broke into Activision’s Slack and Stole Data

Activision, the publisher of computer games (including the Call of Duty franchise), reported a security breach that occurred back in…

Cybersecurity Experts Discovered a New Stealc Infostealer

ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due…

Hackers Attacked GoDaddy and Stayed on the Company’s Systems for Several Years

One of the world’s largest hosters and domain name registrars, GoDaddy, reports that hackers have compromised the company’s infrastructure. Worse,…

EBay organized persecution of bloggers

eBay employees organized persecution and intimidation of a family of bloggers

Six former eBay employees became involved in a strange trial.…

Chrome spyware installation campaign

Experts discovered Chrome largest spyware installation campaign

Specialists from the company Awake Security reported about currently perhaps…

Vulnerabilities in Old GTP

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

Experts cautioned that vulnerabilities in the old GTP (GPRS Tunneling…

GitHub will replace the term "master"

GitHub will replace the term “master” with a more neutral one

Nat Friedman, leading GitHub after acquiring Microsoft in 2018, said…

CloudEyE collaborated with ransomware operators

Italian IT company CloudEyE collaborated with ransomware operators

For about four years, the Italian company CloudEyE was engaged…

SGAxe endangers Intel processors

SGAxe attack endangers Intel processors

As part of the June “Update Tuesday,” Intel fixed more…

Microsoft fixed 129 vulnerabilities

On June “Patch Tuesday” Microsoft fixed 129 vulnerabilities in its products

“Patch Tuesday” this month became the largest in the history…

Ransomware Tycoon uses JIMAGE

Tycoon ransomware uses exotic JIMAGE format to avoid detection

BlackBerry experts have discovered an unusual multi-platform (for Windows and…

YouTube Channel Credentials

Hacker forums show growing demand for credentials from YouTube channels

IntSights experts found that recently in the darknet there increased…

Users seldom change passwords

Users seldom change passwords even after data leaks

Researchers from Carnegie Mellon University found that users seldom change…

Vulnerability in Indian TikTok Clone

Vulnerability in Indian TikTok clone allows hacking user profiles

The Hacker News reports that Indian security specialist Rahul Kankral…

Octopus Scanner Malware on GitHub

Octopus Scanner Malware Found On GitHub

GitHub developers have issued a warning about the appearance of…

AI Assistant

Hello! 👋 How can I help you today?