The Security Blog From Gridinsoft

Attackers hacked GoDaddy

Hackers Attacked GoDaddy and Stayed on the Company’s Systems for Several Years

One of the world’s largest hosters and domain name registrars, GoDaddy, reports that hackers have compromised the company’s infrastructure. Worse,…

FatalRAT Malware Masks As Popular Apps in Google Ads

ESET experts have discovered the FatalRAT malware, which targets Chinese-speaking users: the threat is distributed through fake websites of popular…

Bing’s Built-In AI Chatbot Misinforms Users and Sometimes Goes Crazy

More recently, Microsoft, together with OpenAI (the one behind the creation of ChatGPT), introduced the integration of an AI-powered chatbot…

Domain Registrar Namecheap Sent Phishing Emails to Its Customers

Domain registrar Namecheap’s email was hacked last weekend and the company sent a flurry of phishing emails (allegedly from MetaMask…

Clop Operators Claim to Hack 130 Organizations Using GoAnywhere MFT Bug

Clop ransomware operators claim to be behind recent attacks on a 0-day vulnerability in the GoAnywhere MFT secure file transfer…

Increased number of "coronavirus" cyberattacks

The number of “coronavirus” cyberattacks increased to 5,000 per day

Check Point experts estimated that the number of “coronavirus” cyberattacks…

PoC exploits for SMBGhost vulnerability

Specialists published PoC exploits for SMBGhost vulnerability

The March “Tuesday of updates” did not include a patch…

Tesla vulnerable to DoS attacks

IS researcher found that the Tesla Model 3 interface is vulnerable to DoS attacks

Researcher Jacob Archuleta, known on the network under the pseudonym…

RDP and VPN usage grew

Due to pandemic, RDP and VPN usage grew by 41% and 33%

Amid of the COVID-19 pandemic, the use of remote access…

Dharma ransomware source code

Dharma ransomware source code put for sale

ZDNet reports that the source code for one of the…

Rare attack via BadUSB

Attackers exposed the American company to a rare attack via BadUSB

Trustwave experts published a report, in which they said that…

Vulnerabilities in popular password managers

Experts have discovered vulnerabilities in popular password managers

Experts from York University explained how they managed to detect…

Hackers spoof DNS settings

Hackers spoof DNS settings to distribute fake coronavirus applications

Journalists from Bleeping Computer investigated that hackers are replacing DNS…

exploit for Kr00k Wi-Fi vulnerability

Published exploit for Kr00k Wi-Fi vulnerability

In February 2020, information security specialists spoke at the RSA…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in…

Firefox Refuses to Support FTP

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an…

Ransomware attacks occur at night

Ransomware attacks most often occur at night and on weekends

According to a report published by the American company FireEye,…

AI Assistant

Hello! 👋 How can I help you today?