The Security Blog From Gridinsoft

BlackLotus UEFI bootkit

Microsoft Told How to Detect the Installation of the BlackLotus UEFI Bootkit

Microsoft has shared a guide to help organizations detect the installation of the BlackLotus UEFI bootkit that exploits the CVE-2022-21894…

Vulnerability Found in Twitter Code That Provokes a “Shadowban” of the Victim

Recently, Twitter fulfilled a promise made by Elon Musk and published on GitHub the source code of its recommender algorithm,…

Strange Enthusiasts Asked ChaosGPT to Destroy Humanity and Establish World Domination

Enthusiasts launched the ChaosGPT project, based on the open-source Auto-GPT, and AI was given access to Google and asked to…

MSMQ Vulnerability Allows Remote Code Execution

Recent update released by Microsoft, an April Patch Tuesday, revealed a severe vulnerability in Microsoft Message Queueing mechanism. That vulnerability…

Hackers Infect eFile Tax Filing Service with Malware

The eFile service, used by many Americans to file their tax returns and authorized by the US Internal Revenue Service…

Chrome extensions injected ads

295 Chrome extensions injected ads in search results

AdGuard analysts have identified 295 malicious extensions in the Chrome…

11 0-day vulnerabilities identified

Google: 11 0-day vulnerabilities identified in the first half of 2020

Google Project Zero experts estimate that 11 0-day vulnerabilities, actively…

Garmin paid ransom to the WastedLocker

Media Reports that Garmin Paid Ransom to WastedLocker Malware Operators

In July 2020, Garmin, the manufacturer of wearable electronics and…

Noticed attacks on EMV cards

Attacks on EMV cards, which were only a theory for 12 years, noticed in reality

Experts from the Gemini Advisory company published a report, according…

Flipper Zero hits Kickstarter

Hacker “Tamagotchi” Flipper Zero hits Kickstarter and collects 7 times more than planned

Hacker “Tamagotchi” Flipper Zero hits Kickstarter today. It was required…

Outage of Garmin services

Ransomware attack caused Garmin’s four-day services outage

Earlier this week, manufacturer of electronics and navigation equipment Garmin…

five vulnerabilities in D-Link routers

Information security specialists disclosed details of five vulnerabilities in D-Link routers

Loginsoft experts have reported about five serious vulnerabilities found in…

Steve Wozniak sues YouTube

Steve Wozniak Sues YouTube Over Cryptocurrency Scammers

Steve Wozniak and more than ten other plaintiffs have sued…

Hacking the DeepSource GitHub Application

DeepSource Developers Talked about Hacking of Their GitHub Application

A popular automated code analysis tool, DeepSource, is designed to…

Prometei botnet uses SMB

Prometei botnet uses SMB for distribution

Cisco Talos has discovered a new botnet, Prometei, which was…

Google services used for phishing

Google cloud services are used for phishing

Attackers, whose main goal is to steal various credentials, are…

REvil demand $7.5 million

REvil Operators Demand $7.5 Million Ransom from Argentine Internet Provider

Last weekend, one of Argentina’s largest internet providers, Telecom Argentina,…

AI Assistant

Hello! 👋 How can I help you today?