The Security Blog From Gridinsoft

Emotet has resumed activity

Emotet Has Resumed Activity after a Three-Month Break

Experts noticed that this week Emotet resumed its activity and after a three-month “rest” began to send malicious spam again.…

Acronis Breached, Internal Data Leaked

Acronis, a Swiss-based information technology company that provides file recovery services for hacked companies was breached earlier this month. The…

Researcher Publishes RCE Exploit for Critical Vulnerability in Microsoft Word

A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft Office product, namely Microsoft Word, has emerged online. This issue…

Bing Chatbot Could Be a Convincing Scammer, Researchers Say

Security researchers have noticed that by using text prompts embedded in web pages, hackers can force Bing’s AI chatbot to…

New Acer Breach Exposes 160GB of Data

Companies tend to hide the case of a cybersecurity breach – for certain reasons, it may be for their good.…

Valak using Microsoft Exchange

Valak malware steals corporate data using Microsoft Exchange servers

Cyberreason Nocturnus experts said that the Valak bootloader discovered in…

Experts confirmed LiveJournal leak.

Experts confirm data leak of 26 million LiveJournal users

In mid-May 2020, in the Telegram channel of the head…

Discord as a tool for stealing password

Hackers use Discord as a tool for stealing passwords

The Bleeping Computer magazine warns that the new version of…

Sarwent Opens RDP Ports

Sarwent malware opens RDP ports on infected machines

SentinelOne experts noticed that the new version of the Sarwent…

Qatar spyware containing COVID-19

Qatar obliged citizens to install “spyware” for containing COVID-19 pandemic

As part of the fight against the spread of coronavirus…

GitLab checked employees on phishing

GitLab checked its employees: on phishing got every fifth

Recently, the GitLab platform conducted a security audit, analyzing if…

GhostDNS source code exploit

Avast experts accidentally got source code for GhostDNS exploit

Avast analysts suddenly got the source codes for the GhostDNS…

five 0-day vulnerabilities in Windows

ZDI experts described five 0-day vulnerabilities in Windows

Researchers from the Trend Micro Zero Day Initiative (ZDI) team…

Twitter bot detection tool

Experts developed a free bot detection tool on Twitter

NortonLifeLock, which appeared after Symantec sold its information security division…

Hackers Cracked European Supercomputers

Hackers cracked European supercomputers and forced them to mine cryptocurrency

In Europe were attacked super powerful computers at universities and…

Mandrake was hiding on Google Play

Mandrake malware was hiding on Google Play for more than four years

Bitdefender experts found Mandrake spyware in the official Android app…

Ramsay attacks isolated PCs

Ramsay malware attacks PCs, which isolated from the outside world

ESET analysts discovered the infrastructure of a previously unknown Ramsay…

AI Assistant

Hello! 👋 How can I help you today?