The Security Blog From Gridinsoft

YouTube and Pixel smartphones

YouTube Video Causes Pixel Smartphones to Reboot

Users have found that Pixel smartphones powered by Google Tensor processors are rebooting when user is trying to watch a…

The Researcher Hacked His Own Bank Account by Imitating a Voice with AI

The journalist Vice Motherboard Joseph Cox hacked the bank account by imitating a voice with the help of AI, which…

Nearly 50% of Cybersecurity Leaders Will Change Jobs by 2025

According to a new report from Gartner, by 2025, nearly 50% of cybersecurity leaders will change jobs, and 25% will…

Hackers Broke into Activision’s Slack and Stole Data

Activision, the publisher of computer games (including the Call of Duty franchise), reported a security breach that occurred back in…

Cybersecurity Experts Discovered a New Stealc Infostealer

ekoia experts report that a new infostealer, Stealc, has appeared on the darknet, and is gaining popularity among criminals due…

Tesla vulnerable to DoS attacks

IS researcher found that the Tesla Model 3 interface is vulnerable to DoS attacks

Researcher Jacob Archuleta, known on the network under the pseudonym…

RDP and VPN usage grew

Due to pandemic, RDP and VPN usage grew by 41% and 33%

Amid of the COVID-19 pandemic, the use of remote access…

Dharma ransomware source code

Dharma ransomware source code put for sale

ZDNet reports that the source code for one of the…

Rare attack via BadUSB

Attackers exposed the American company to a rare attack via BadUSB

Trustwave experts published a report, in which they said that…

Vulnerabilities in popular password managers

Experts have discovered vulnerabilities in popular password managers

Experts from York University explained how they managed to detect…

Hackers spoof DNS settings

Hackers spoof DNS settings to distribute fake coronavirus applications

Journalists from Bleeping Computer investigated that hackers are replacing DNS…

exploit for Kr00k Wi-Fi vulnerability

Published exploit for Kr00k Wi-Fi vulnerability

In February 2020, information security specialists spoke at the RSA…

Cybercriminals fake letters from WHO

Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19

Specialists from IBM X-Force discovered a new malicious campaign, in…

Firefox Refuses to Support FTP

Firefox Refuses to Support FTP Protocol

ZDNet reports that Mozilla developers consider FTP to be an…

Ransomware attacks occur at night

Ransomware attacks most often occur at night and on weekends

According to a report published by the American company FireEye,…

Snoop steals data from Intel processors

Snoop attack steals data from Intel processors

Amazon Web Services (AWS) software engineer Pawel Wieczorkiewicz discovered another…

Microsoft stopped RDCMan development

Microsoft stopped RDCMan development due to a bug

Microsoft has stopped development of the Remote Desktop Connection Manager…

AI Assistant

Hello! 👋 How can I help you today?