BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Apple's New Data & Privacy Portal Lets You Download Your Data

Apple has released a new data & privacy portal that can be used to download data that is linked to your Apple ID. This data can include transaction history, Apple app history, AppleCare history, marketing data, and more. [...]

https://www.bleepingcomputer.com/news/apple/apples-new-data-and-privacy-portal-lets-you-download-your-data/
jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew

Of the thousands of plugins for the jQuery framework, one of the most popular of them harbored for at least three years an oversight in code that eluded the security community, despite public availability of tutorials that explained how it could be exploited. [...]

https://www.bleepingcomputer.com/news/security/jquery-file-upload-plugin-vulnerable-for-8-years-and-only-hackers-knew/
The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More

It has been another slow week, with mostly new variants of existing ransomware being released. The biggest news is that the GandCrab Ransomware developers have decided to release the decryption keys for Syrian victims. [...]

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-19th-2018-gandcrab-birbware-and-more/
Kraken Cryptor Ransomware Connecting to BleepingComputer During Encryption

Over the weekend, the Kraken Cryptor Ransomware released version 2.0.6, which now connects to BleepingComputer during different stages of their encryption process. It is not known what they are trying to achieve by doing this, but it does provide BleepingComputer with insight into the amount of its victims. [...]

https://www.bleepingcomputer.com/news/security/kraken-cryptor-ransomware-connecting-to-bleepingcomputer-during-encryption/
Remote Code Execution Flaws Found in Popular OS Powering Embedded Systems

FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in smart homes and critical infrastructure systems has 13 vulnerabilities, a third of them allowing remote code execution. [...]

https://www.bleepingcomputer.com/news/security/remote-code-execution-flaws-found-in-popular-os-powering-embedded-systems/
Libssh CVE-2018-10933 Scanners & Exploits Released - Apply Updates Now

Last week a vulnerability was disclosed regarding a ridiculously easy authentication bypass vulnerability in libssh. Since then, multiple tools and scripts have been released that allow attackers to remotely exploit this vulnerability in order to remotely execute commands on vulnerable devices. [...]

https://www.bleepingcomputer.com/news/security/libssh-cve-2018-10933-scanners-and-exploits-released-apply-updates-now/
Skype Preview for Windows 10 is Getting Split View Mode

Microsoft is currently working hard to update the new modern Skype 8 with all necessary features as the company plans to end support for Skype Classic on November 1. Today, Microsoft announced that the Split View mode is now available in Skype preview for Windows 10. [...]

https://www.bleepingcomputer.com/news/microsoft/skype-preview-for-windows-10-is-getting-split-view-mode/
Firefox Targeting Competing VPN Sites With ProtonVPN Offer in New Test

Mozilla has announced a study where Firefox will promote the ProtonVPN service as a new revenue source. BleepingComputer was able to gain access to the study's extension and it appears that the ProtonVPN will be recommended when visiting competing VPN providers, streaming services, or when connecting to insecure wireless gateways. [...]

https://www.bleepingcomputer.com/news/software/firefox-targeting-competing-vpn-sites-with-protonvpn-offer-in-new-test/
Critical Infrastructure & Supply Chain Remain Highly Vulnerable to Attacks

Additionally, cybercriminals have been targeting the commercial sector with as much aggression and skill as their attacks against the government. Unfortunately, some attacks against the government. Unfortunately, some attacks against corporations have national security ramifications, a fact not yet fully realized by all businesses. [...]

https://www.bleepingcomputer.com/news/security/critical-infrastructure-and-supply-chain-remain-highly-vulnerable-to-attacks/