The Security Blog From Gridinsoft

bypass ChatGPT restrictions

Hackers Are Promoting a Service That Allows Bypassing ChatGPT Restrictions

Check Point researchers say that the OpenAI API is poorly protected from various abuses, and it is quite possible to…

TrickBot Members Sanctioned By U.S. and UK

US and UK law enforcements imposed sanctions against 7 members of a cybercrime gang that stands after TrickBot malware, including…

Hackers Published an Exploit for a Dangerous Vulnerability in GoAnywhere MFT

Hackers published on the network an exploit for a zero-day vulnerability that is actively used in the GoAnywhere MFT administration…

ESXiArgs Ransomware Launches Massive Attacks on VMware ESXi Servers

Hosting providers and the French CERT warn that more than 3,200 VMware ESXi servers were compromised by the new ESXiArgs…

IceBreaker Backdoor Emerged, Exploiting New Phishing Way

A new player has appeared in cyberspace, with surprisingly new methods. A previously unknown group attacked gambling and online gaming…

Snoop steals data from Intel processors

Snoop attack steals data from Intel processors

Amazon Web Services (AWS) software engineer Pawel Wieczorkiewicz discovered another…

Microsoft stopped RDCMan development

Microsoft stopped RDCMan development due to a bug

Microsoft has stopped development of the Remote Desktop Connection Manager…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as…

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recently, I wrote all about the vulnerabilities of Intel and…

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called…

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for…

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

According to a study by Which company, more than 40%…

700 problematic Microsoft subdomains

Researchers found about 700 problematic Microsoft subdomains

Vullnerability researchers found about 700 problematic Microsoft subdomains and captured…

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious…

Chinese Coronavirus Detection App

Chinese coronavirus detection app transmits data to the police

Last month, Chinese authorities released the Alipay Health Code coronavirus…

Epiq Global cyberattack

Cyberattack with the use of ransomware forced Epiq Global to shut down its systems

Epiq Global, a large international law firm, has become the…

Facebook OAuth Vulnerability

Vulnerability in OAuth Protocol Allows Hacking Any Facebook Account

The vulnerability is contained in the Facebook login feature, which…

AI Assistant

Hello! 👋 How can I help you today?