BleepingComputer
10.6K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Open source software host Fosshost shutting down as CEO unreachable

Open source software hosting provider Fosshost will no longer be providing services as it reaches end of life. Fosshost project volunteers announced the development this weekend following months of difficulties in reaching the leadership including the CEO. [...]

https://www.bleepingcomputer.com/news/technology/open-source-software-host-fosshost-shutting-down-as-ceo-unreachable/
Latest news and stories from BleepingComputer.com
Open source software host Fosshost shutting down as CEO unreachable

Open source software hosting provider Fosshost will no longer be providing services as it reaches end of life. Fosshost project volunteers announced the development this weekend following months of difficulties in reaching the leadership including the CEO. [...]
Latest news and stories from BleepingComputer.com
OpenAI's new ChatGPT bot: 10 coolest things you can do with it

From precisely spotting security vulnerabilities in your code, to writing an entire block of functional code on a whim, to opening portals to another dimension, OpenAI's newly launched ChatGPT is a game changer with its possibilities seeming limited only by your limitedness. [...]
OpenAI's new ChatGPT bot: 10 coolest things you can do with it

From precisely spotting security vulnerabilities in your code, to writing an entire block of functional code on a whim, to opening portals to another dimension, OpenAI's newly launched ChatGPT is a game changer with its possibilities seeming limited only by your limitedness. [...]

https://www.bleepingcomputer.com/news/technology/openais-new-chatgpt-bot-10-coolest-things-you-can-do-with-it/
👍1
Hackers hijack Linux devices using PRoot isolated filesystems

Hackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent repository of malicious tools that work on many Linux distributions. [...]

https://www.bleepingcomputer.com/news/security/hackers-hijack-linux-devices-using-proot-isolated-filesystems/
Sneaky hackers reverse defense mitigations when detected

A financially motivated threat actor is hacking telecommunication service providers and business process outsourcing firms, actively reversing defensive mitigations applied when the breach is detected. [...]

https://www.bleepingcomputer.com/news/security/sneaky-hackers-reverse-defense-mitigations-when-detected/