The Security Blog From Gridinsoft

Aspera Faspex Breach CVE-2022-47986 Is Used To Deploy Ransomware

Ransomware Actors Target IBM’s Aspera Faspex

File transfer utility Aspera Faspex, developed by IBM, became a riding mare of cybercriminals. A vulnerability discovered in the past…

3CX Phone System is Struck With Chain Supply Attack

3CX Phone System, a desktop app for business phone communication, fell victim to a supply chain attack. Recent updates deliver…

Binance US Ban Scams Incoming: What to Expect?

Recent events around one of the world’s largest cryptocurrency exchanges Binance sound threatening. CFTC, the U.S. regulator of commodity futures…

The aCropalypse Vulnerability Poses a Threat Not Only to Pixel, but Also to Windows

Information security experts have discovered that the aCropalypse vulnerability, which allows restoring the original image edited on a Google Pixel…

Malicious ChatGPT Add-On Hijack Facebook Accounts

ChatGPT became a worldwide phenomenon in recent months. GPT-4 update created even more hype around it, bringing it on top…

five vulnerabilities in D-Link routers

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Loginsoft experts have reported about five serious vulnerabilities found in…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

BlackRock Trojan on Android OS

BlackRock Trojan steals passwords and card data from 337 applications on Android OS

Researchers from ThreatFabric have published a report on the study…

PoC exploit for RECON vulnerability

For RECON vulnerability appeared PoC exploit

Earlier this week, it became known that SAP engineers fixed…

Microsoft fixed 123 vulnerabilities

On July “Patch Tuesday”, only Microsoft fixed 123 vulnerabilities

As part of the July update Tuesday, Microsoft engineers fixed…

NightLion hacked DataViper

NightLion hacker claims to have hacked DataViper information security company

A hacker, hiding under the pseudonym NightLion, claims that has…

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently…

AI Assistant

Hello! 👋 How can I help you today?