BleepingComputer
9.74K subscribers
41 photos
24.2K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
โ€ŠmacOS Sequoia change breaks networking for VPN, antivirus software

Users of macOS 15 'Sequoia' are reporting network connection errors when using certain endpoint detection and response (EDR) or virtual private network (VPN) solutions, and web browsers. [...]

https://www.bleepingcomputer.com/news/apple/macos-sequoia-change-breaks-networking-for-vpn-antivirus-software/
๐Ÿ˜1๐Ÿคก1
โ€ŠUkraine bans Telegram on military, govt devices over security risks

Ukraine's National Coordination Centre for Cybersecurity (NCCC) has restricted the use of the Telegram messaging app within government agencies, military units, and critical infrastructure, citing national security concerns. [...]

https://www.bleepingcomputer.com/news/security/ukraine-bans-telegram-on-military-govt-devices-over-security-risks/
๐Ÿ‘7โค2๐Ÿ˜1๐Ÿ’ฉ1๐Ÿคก1
โ€ŠDisney ditching Slack after massive July data breach

The Walt Disney Company is reportedly ditching Slack after a July data breach exposed over 1TB of confidential messages and files posted to the company's internal communication channels. [...]

https://www.bleepingcomputer.com/news/security/disney-ditching-slack-after-massive-july-data-breach/
๐Ÿคก7
โ€ŠMicrosoft ends development of Windows Server Update Services (WSUS)

Microsoft has officially announced that Windows Server Update Services (WSUS) is now deprecated, but plans to maintain current functionality and continue publishing updates through the channel. [...]

https://www.bleepingcomputer.com/news/microsoft/microsoft-officially-deprecates-windows-server-update-services-wsus/
๐Ÿ’ฉ4๐Ÿ˜จ2
โ€ŠGlobal infostealer malware operation targets crypto users, gamers

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named "Marko Polo." [...]

https://www.bleepingcomputer.com/news/security/global-infostealer-malware-operation-targets-crypto-users-gamers/
๐Ÿคก3
โ€ŠNew Google Chrome feature will translate complex pages in real time

Google is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages. [...]

https://www.bleepingcomputer.com/news/google/new-google-chrome-feature-will-translate-complex-pages-in-real-time/
๐Ÿ‘4โค1
โ€ŠHow to manage shadow IT and reduce your attack surface

In today's fast-paced business environment, employees increasingly turn to unauthorized IT solutions, called Shadow IT, to streamline their work and boost productivity. This article explores the prevalence of shadow IT, the risks it poses and discusses strategies for managing it. [...]

https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/
โ€ŠAndroid malware 'Necro' infects 11 million devices via Google Play

A new version of the Necro Trojan malware for Android was installed on 11 million devices through Google Play in malicious SDK supply chain attacks. [...]

https://www.bleepingcomputer.com/news/security/android-malware-necro-infects-11-million-devices-via-google-play/
๐Ÿ‘2โคโ€๐Ÿ”ฅ1โค1
โ€ŠKaspersky deletes itself, installs UltraAV antivirus without warning

Starting Thursday, Kaspersky deleted its anti-malware software from computers across the United States and replaced it with UltraAV's antivirus solution without warning. [...]

https://www.bleepingcomputer.com/news/security/kaspersky-deletes-itself-installs-ultraav-antivirus-without-warning/
๐Ÿคช6๐Ÿ’ฉ4๐Ÿ˜3๐Ÿ˜Ž2
โ€ŠNew Mallox ransomware Linux variant based on leaked Kryptina code

An affiliate of the Mallox ransomware operation, also known as TargetCompany, was spotted using a slightly modified version of the Kryptina ransomware to attack Linux systems. [...]

https://www.bleepingcomputer.com/news/security/new-mallox-ransomware-linux-variant-based-on-leaked-kryptina-code/
๐Ÿคฃ3โค1
โ€ŠTelegram now shares usersโ€™ IP and phone number on legal requests

Telegram will now share users' phone numbers and IP addresses with law enforcement if they are found to be violating the platform's rules following a valid legal request. [...]

https://www.bleepingcomputer.com/news/security/telegram-now-shares-users-ip-and-phone-number-on-legal-requests/
๐Ÿคฎ23๐Ÿ‘Ž5๐ŸŒš3๐Ÿ‘1
โ€ŠUS proposes ban on connected vehicle tech from China, Russia

Today, the Biden administration announced new proposed measures to defend the United States' national security from potential threats linked to connected vehicle technologies originating from China and Russia. [...]

https://www.bleepingcomputer.com/news/security/us-proposes-ban-on-connected-vehicle-tech-from-china-russia/
๐Ÿ‘7๐Ÿ–•4๐Ÿฅฐ1
โ€ŠGenerative AI Security: Getting ready for Salesforce Einstein Copilot

Salesforce's Einstein Copilot can provide insights and perform tasks help streamline daily processes. However, it also comes with risks that you should takes steps to mitigate. Learn more from Varonis on how to prepare for Salesforce Einstein Copilot, [...]

https://www.bleepingcomputer.com/news/security/generative-ai-security-getting-ready-for-salesforce-einstein-copilot/
๐Ÿ–•3
โ€ŠHackers deploy AI-written malware in targeted attacks

While cybercriminals have used generative AI technology to create convincing emails, government agencies have warned about the potential abuse of AI tools to creating malicious software, despite the safeguards and restrictions that vendors implemented. [...]

https://www.bleepingcomputer.com/news/security/hackers-deploy-ai-written-malware-in-targeted-attacks/
โค4
โ€ŠCritical Ivanti vTM auth bypass bug now exploited in attacks

CISA has tagged another critical Ivanti security vulnerability, which can let threat actors create rogue admin users on vulnerable Virtual Traffic Manager (vTM) appliances, as actively exploited in attacks. [...]

https://www.bleepingcomputer.com/news/security/critical-ivanti-vtm-auth-bypass-bug-now-exploited-in-attacks/
โ€ŠInfostealer malware bypasses Chromeโ€™s new cookie-theft defenses

Infostealer malware developers released updates claiming to bypass Google Chrome's recently introduced feature App-Bound Encryption to protect sensitive data such as cookies. [...]

https://www.bleepingcomputer.com/news/security/infostealer-malware-bypasses-chromes-new-cookie-theft-defenses/
๐Ÿ‘1
โ€ŠU.S. govt agency CMS says data breach impacted 3.1 million people

The Centers for Medicare & Medicaid Services (CMS) federal agency announced earlier this month that health and personal information of more than three million health plan beneficiaries was exposed in the MOVEit attacks Cl0p ransomware conducted last year. [...]

https://www.bleepingcomputer.com/news/healthcare/us-govt-agency-cms-says-data-breach-impacted-31-million-people/