The Security Blog From Gridinsoft

vulnerabilities in WordPress plugins

Exploits for Vulnerabilities in Three Popular WordPress Plugins Appeared on the Network

Three popular WordPress plugins, with tens of thousands of active installations, at once turned out to have critical SQL injection…

Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human…

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for…

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack…

Windows 7 Extended Security Update Program cancelled

On January 8, 2023, Microsoft announced the cancellation of the ESU program for Windows 7. The OS version released back…

Access to cameras on Mac and iPhone

Vulnerabilities allowed access to cameras on Mac, iPhone and iPad

Apple paid $75,000 to the IS researcher Ryan Pickren in…

Increased number of "coronavirus" cyberattacks

The number of “coronavirus” cyberattacks increased to 5,000 per day

Check Point experts estimated that the number of “coronavirus” cyberattacks…

PoC exploits for SMBGhost vulnerability

Specialists published PoC exploits for SMBGhost vulnerability

The March “Tuesday of updates” did not include a patch…

Tesla vulnerable to DoS attacks

IS researcher found that the Tesla Model 3 interface is vulnerable to DoS attacks

Researcher Jacob Archuleta, known on the network under the pseudonym…

RDP and VPN usage grew

Due to pandemic, RDP and VPN usage grew by 41% and 33%

Amid of the COVID-19 pandemic, the use of remote access…

Dharma ransomware source code

Dharma ransomware source code put for sale

ZDNet reports that the source code for one of the…

Rare attack via BadUSB

Attackers exposed the American company to a rare attack via BadUSB

Trustwave experts published a report, in which they said that…

Vulnerabilities in popular password managers

Experts have discovered vulnerabilities in popular password managers

Experts from York University explained how they managed to detect…

Hackers spoof DNS settings

Hackers spoof DNS settings to distribute fake coronavirus applications

Journalists from Bleeping Computer investigated that hackers are replacing DNS…

exploit for Kr00k Wi-Fi vulnerability

Published exploit for Kr00k Wi-Fi vulnerability

In February 2020, information security specialists spoke at the RSA…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in…

Firefox Refuses to Support FTP

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an…