BleepingComputer
10.4K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
123456 Is the Most Used Password for the 5th Year in a Row

For the 5th year in a row, "123456" is most used password, with "password" coming in at second place. Even in the wake of a constant stream of data breaches, hacks, and ransomware attack reports people continue to utilize weak passwords that not only put their information at jeopardy, but also their organization's data. [...]

https://www.bleepingcomputer.com/news/security/123456-is-the-most-used-password-for-the-5th-year-in-a-row/
Microsoft Launches AI Malware Prediction Competition with $25K Prize

Microsoft is challenging the data science community to come up with AI models that can accurately predict whether a computer would become infected based on the device's configuration. The team who successfully predicts the most malware will win a prize of $25,000 USD. [...]

https://www.bleepingcomputer.com/news/security/microsoft-launches-ai-malware-prediction-competition-with-25k-prize/
Neofetch Creates Colorful System Information Screens using Ascii Art

If you ever wanted to share you system information with another user, whether that be in a support forum or to show off your rig, its always nice to do so in style. A program called Neofetch allows you to do so using colorful ascii operating system logos along with information about your system that you can then share as an image. [...]

https://www.bleepingcomputer.com/news/software/neofetch-creates-colorful-system-information-screens-using-ascii-art/
How to Decrypt HiddenTear Ransomware with HT Brute Forcer

If you have been infected with a HiddenTear Ransomware variant, then you are in luck as a decryptor called HT Brute Forcer has been created by Michael Gillespie that allows you decrypt your files without having to pay the ransom. [...]

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-hiddentear-ransomware-with-ht-brute-forcer/
How to Decrypt the InsaneCrypt or Everbe 1 Family of Ransomware

If you are infected with the InsaneCrypt or Everbe 1.0 family of ransomware infections, a decryptor has been created that recover your files for free. [...]

https://www.bleepingcomputer.com/ransomware/decryptor/how-to-decrypt-the-insanecrypt-or-everbe-1-family-of-ransomware/
New Extortion Email Threatens to Send a Hitman Unless You Pay 4K

These extortion emails are getting wilder and wilder. First we had the sextortion scams that threatened to reveal victims doing dirty deeds, then bomb threats, which brought the attention of law enforcement worldwide, and now we have threats that a hitman is targeting you unless you pay $4,000 in bitcoin. [...]

https://www.bleepingcomputer.com/news/security/new-extortion-email-threatens-to-send-a-hitman-unless-you-pay-4k/
File Inclusion Bug in Kibana Console for Elasticsearch Gets Exploit Code

Exploit code has been published for a local file inclusion (LFI) type of vulnerability affecting the Console plugin in Kibana data visualization tool for Elasticsearch; an attacker could use this to upload a malicious script and potentially get remote code execution. [...]

https://www.bleepingcomputer.com/news/security/file-inclusion-bug-in-kibana-console-for-elasticsearch-gets-exploit-code/
A Look at 3 Illicit Mining Groups Who Target Enterprise Services

New research explores the similarities of three illicit mining cybercrime groups that are known to compromise enterprise services in order to install miners. Combined, these three groups have generated approximately 1,200 Monero coins, [...]

https://www.bleepingcomputer.com/news/security/a-look-at-3-illicit-mining-groups-who-target-enterprise-services/
Remote Firmware Attack Renders Servers Unbootable

Security researchers have found a way to corrupt the firmware of a critical component usually found in servers to turn the systems into an unbootable hardware assembly. The recovery procedure requires physical intervention to replace the malicious firmware. [...]

https://www.bleepingcomputer.com/news/security/remote-firmware-attack-renders-servers-unbootable/
Microsoft Releases Out-of-Band Security Update for Internet Explorer RCE Zero-Day

Microsoft has released an out-of-band security update that fixes an actively exploited vulnerability in Internet Explorer.  This vulnerability has been assigned ID CVE-2018-8653 and was discovered by Google's Threat Analysis Group when they saw the vulnerability being used in targeted attacks. [...]

https://www.bleepingcomputer.com/news/security/microsoft-releases-out-of-band-security-update-for-internet-explorer-rce-zero-day/
Windows 10 Insider Build 18305 Released with Tons of New Features

Microsoft has released Windows 10 Insider Preview Build 18305 (19H1) to insiders in the Fast ring. This is going to be the last Windows Insider build released in 2018 and it comes with a ton of new features such as the Windows Sandbox, new Windows Defender settings, streamlined menus and interfaces, Friendly Dates, and more. [...]

https://www.bleepingcomputer.com/news/microsoft/windows-10-insider-build-18305-released-with-tons-of-new-features/