BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
โ€ŠHackers deploy crypto drainers on thousands of WordPress sites

Almost 2,000 hacked WordPress sites now display fake NFT and discount pop-ups to trick visitors into connecting their wallets to crypto drainers that automatically steal funds. [...]

https://www.bleepingcomputer.com/news/security/hackers-deploy-crypto-drainers-on-thousands-of-wordpress-sites/
๐Ÿคฌ2๐Ÿ”ฅ1
โ€ŠGoogle rolls out new Find My Device network to Android devices

Google is rolling out an upgraded Find My Device network to Android devices in the United States and Canada, almost one year after it was first unveiled during the Google I/O 2023 conference in May. [...]

https://www.bleepingcomputer.com/news/google/google-rolls-out-new-find-my-device-network-to-android-devices/
โ€ŠCritical RCE bug in 92,000 D-Link NAS devices now exploited in attacks

โ€‹Attackers are now actively targeting over 92,000 end-of-life D-Link Network Attached Storage (NAS) devices exposed online and unpatched against a critical remote code execution (RCE) zero-day flaw. [...]

https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-92-000-d-link-nas-devices-now-exploited-in-attacks/
๐Ÿ‘5
โ€ŠTargus discloses cyberattack after hackers detected on file servers

Laptop and tablet accessories maker Targus disclosed that it suffered a cyberattack disrupting operations after a threat actor gained access to the company's file servers. [...]

https://www.bleepingcomputer.com/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/
๐Ÿ”ฅ5๐Ÿ‘1
โ€ŠNew SharePoint flaws help hackers evade detection when stealing files

Researchers have discovered two techniques that could enable attackers to bypass audit logs or generate less severe entries when downloading files from SharePoint. [...]

https://www.bleepingcomputer.com/news/security/new-sharepoint-flaws-help-hackers-evade-detection-when-stealing-files/
๐Ÿ‘2๐Ÿ˜1
โ€ŠImplementing container security best practices using Wazuh

Maintaining visibility into container hosts, ensuring best practices, and conducting vulnerability assessments are necessary to ensure effective security. In this article Wazuh explores how its software can help implement best security practices for containerized environments. [...]

https://www.bleepingcomputer.com/news/security/implementing-container-security-best-practices-using-wazuh/
โค1๐Ÿ‘1
โ€ŠRUBYCARP hackers linked to 10-year-old cryptomining botnet

A Romanian botnet group named 'RUBYCARP' is leveraging known vulnerabilities and performing brute force attacks to breach corporate networks and compromise servers for financial gain. [...]

https://www.bleepingcomputer.com/news/security/rubycarp-hackers-linked-to-10-year-old-cryptomining-botnet/
๐Ÿ”ฅ3๐Ÿคฃ1
โ€ŠWindows 11 KB5036893 update released with 29 changes, Moment 5 features

Microsoft has released the KB5036893 cumulative update for Windows 11 23H3, which includes 29 changes and fixes and enables the Moment 5 features for every user. [...]

https://www.bleepingcomputer.com/news/microsoft/windows-11-kb5036893-update-released-with-29-changes-moment-5-features/
โค1๐Ÿ”ฅ1๐ŸŒญ1
โ€ŠGHC-SCW: Ransomware gang stole health data of 533,000 people

Non-profit healthcare service provider Group Health Cooperative of South Central Wisconsin (GHC-SCW) has disclosed that a ransomware gang breached its network in January and stole documents containing the personal and medical information of over 500,000 individuals. [...]

https://www.bleepingcomputer.com/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/
๐Ÿคฃ2
โ€ŠCritical Rust flaw enables Windows command injection attacks

Threat actors can exploit a security vulnerability in the Rust standard library to target Windows systems in command injection attacks. [...]

https://www.bleepingcomputer.com/news/security/critical-rust-flaw-enables-windows-command-injection-attacks/
๐Ÿคฃ3๐Ÿ‘1๐Ÿ—ฟ1
โ€ŠMicrosoft fixes two Windows zero-days exploited in malware attacks

Microsoft has fixed two actively exploited zero-day vulnerabilities during the April 2024 Patch Tuesday, although the company failed to initially tag them as such. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-two-windows-zero-days-exploited-in-malware-attacks/
๐Ÿ‘1๐Ÿ”ฅ1
โ€ŠReusing passwords: The hidden cost of convenience

Password reuse might seem like a small problem โ€” but it can have far-reaching consequences for an organization's cybersecurity. Learn more from Specops Software about what IT teams can do to combat the problem. [...]

https://www.bleepingcomputer.com/news/security/reusing-passwords-the-hidden-cost-of-convenience/
โ€ŠAT&T now says data breach impacted 51 million customers

AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. [...]

https://www.bleepingcomputer.com/news/security/att-now-says-data-breach-impacted-51-million-customers/
๐Ÿ’ฉ3๐Ÿ–•1
โ€ŠMalicious PowerShell script pushing malware looks AI-written

A threat actor is using a PowerShell script that was likely created with the help of an artificial intelligence system such as OpenAI's ChatGPT, Google's Gemini, or Microsoft's CoPilot. [...]

https://www.bleepingcomputer.com/news/security/malicious-powershell-script-pushing-malware-looks-ai-written/
๐Ÿคฎ2๐Ÿ”ฅ1
โ€ŠChrome Enterprise gets Premium security but you have to pay for it

Google has announced a new version of its browser for organizations, Chrome Enterprise Premium, which comes with extended security controls for a monthly fee per user. [...]

https://www.bleepingcomputer.com/news/security/chrome-enterprise-gets-premium-security-but-you-have-to-pay-for-it/
๐Ÿคก4๐Ÿ–•2๐Ÿคช2๐Ÿ‘1๐Ÿ˜1๐Ÿคจ1
โ€ŠDuckDuckGo launches a premium Privacy Pro VPN service

DuckDuckGo has launched a new paid-for 3-in-1 subscription service called 'Privacy Pro,' which includes a virtual private network (VPN), a personal data removal service, and an identity theft restoration solution. [...]

https://www.bleepingcomputer.com/news/security/duckduckgo-launches-a-premium-privacy-pro-vpn-service/
๐Ÿค”4๐Ÿ‘Ž3๐Ÿ‘2๐Ÿ–•2