The Security Blog From Gridinsoft

Attackers hacked GoDaddy

Hackers Attacked GoDaddy and Stayed on the Company’s Systems for Several Years

One of the world’s largest hosters and domain name registrars, GoDaddy, reports that hackers have compromised the company’s infrastructure. Worse,…

FatalRAT Malware Masks As Popular Apps in Google Ads

ESET experts have discovered the FatalRAT malware, which targets Chinese-speaking users: the threat is distributed through fake websites of popular…

Bing’s Built-In AI Chatbot Misinforms Users and Sometimes Goes Crazy

More recently, Microsoft, together with OpenAI (the one behind the creation of ChatGPT), introduced the integration of an AI-powered chatbot…

Domain Registrar Namecheap Sent Phishing Emails to Its Customers

Domain registrar Namecheap’s email was hacked last weekend and the company sent a flurry of phishing emails (allegedly from MetaMask…

Clop Operators Claim to Hack 130 Organizations Using GoAnywhere MFT Bug

Clop ransomware operators claim to be behind recent attacks on a 0-day vulnerability in the GoAnywhere MFT secure file transfer…

Malware steal Android cookies

Two new malware can steal cookies from Android apps

IS experts discovered two new malware for Android (recognized as…

RAM vulnerable to Rowhammer attacks

Modern RAM is still vulnerable to Rowhammer attacks

Recently, I wrote all about the vulnerabilities of Intel and…

LVI attack on Intel processors

Intel processors need hardware fixes due to new LVI attack

Security experts discovered a new attack on Intel processors called…

Two attacks on AMD processors

Information security experts said that AMD processors are vulnerable to two attacks

A joint group of specialists from the National Center for…

Android users are at risk

More than 40% of Android users are at risk of cyberattacks

According to a study by Which company, more than 40%…

700 problematic Microsoft subdomains

Researchers found about 700 problematic Microsoft subdomains

Vullnerability researchers found about 700 problematic Microsoft subdomains and captured…

Malicious extension Ledger Live

Malicious Ledger Live extension for Chrome steals Ledger wallet data

Harry Denley, Director of Security in MyCrypto discovered the malicious…

Chinese Coronavirus Detection App

Chinese coronavirus detection app transmits data to the police

Last month, Chinese authorities released the Alipay Health Code coronavirus…

Epiq Global cyberattack

Cyberattack with the use of ransomware forced Epiq Global to shut down its systems

Epiq Global, a large international law firm, has become the…

Facebook OAuth Vulnerability

Vulnerability in OAuth Protocol Allows Hacking Any Facebook Account

The vulnerability is contained in the Facebook login feature, which…

Hackers Scan Microsoft Exchange

Hackers scan network for vulnerable Microsoft Exchange servers

Information security experts warn that hackers are already scanning the…

Kr00k Wi-Fi Chips Vulnerability

Kr00k Wi-Fi-chips vulnerability affects over a billion devices

At the RSA 2020 conference, ESET specialists spoke about the…

AI Assistant

Hello! 👋 How can I help you today?