The Security Blog From Gridinsoft

Acronis Breach Exposes Internal Company Data

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery services for hacked companies was breached earlier this month. The…

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to…

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good.…

BlackLotus UEFI Bootkit Bypasses Protection even in Windows 11

ESET experts reported that the BlackLotus UEFI bootkit, which is sold on hacker forums for about $ 5,000, is indeed…

Experts confirmed LiveJournal leak.

Experts confirm data leak of 26 million LiveJournal users

In mid-May 2020, in the Telegram channel of the head…

Discord as a tool for stealing password

Hackers use Discord as a tool for stealing passwords

The Bleeping Computer magazine warns that the new version of…

Sarwent Opens RDP Ports

Sarwent malware opens RDP ports on infected machines

SentinelOne experts noticed that the new version of the Sarwent…

Qatar spyware containing COVID-19

Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic

As part of the fight against the spread of coronavirus…

GitLab checked employees on phishing

GitLab checked its employees: on phishing got every fifth

Recently, the GitLab platform conducted a security audit, analyzing if…

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS…

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (ZDI) team…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division…

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and…

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app…

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay…

TOP 10 software vulnerabilities

US authorities have published the top 10 software vulnerabilities, most often exploited over the past 5 years

Cybersecurity and Infrastructure Protection Agency (CISA), part of the US…

AI Assistant

Hello! 👋 How can I help you today?