BleepingComputer
10.3K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Sage 2.0 Ransomware Gearing up for Possible Greater Distribution

The Sage 2.0 Ransomware, which is an updated variant of CryLocker, has been discovered being distributed by one of the same actors who is distributing Locky, Cerber, and Spora. Due to this there is a good chance of wider distribution of this ransomware. This guide provides information on Sage 2.0 and what to expect from it. [...]

https://www.bleepingcomputer.com/news/security/sage-2-0-ransomware-gearing-up-for-possible-greater-distribution/
Apple Releases Critical Security Updates for iOs, macOS, and other Core Products

Today Apple released updates for macOS, iOS, Safari, tvOS, iCloud, and watchOS to fix a variety of security holes as well as to introduce new features. With these releases, Apple fixed 56 vulnerabilities, with many of these vulnerabilities being shared over multiple platforms. [...]

https://www.bleepingcomputer.com/news/security/apple-releases-critical-security-updates-for-ios-macos-and-other-core-products/
HummingBad Android Malware Found in 20 Google Play Store Apps

HummingBad, an Android malware estimated to have touched over 85 million devices worldwide, was recently found in 46 new applications, 20 of which had even made their way into the official Play Store, passing Google's security checks. [...]

https://www.bleepingcomputer.com/news/security/hummingbad-android-malware-found-in-20-google-play-store-apps/
Linux Systemd Flaw Gives Attackers Root Access

Security researcher Sebastian Krahmer has recently discovered that a previously known security flaw in the systemd project can be used for more than crashing a Linux distro but also to grant local attackers root access to the device. [...]

https://www.bleepingcomputer.com/news/security/linux-systemd-flaw-gives-attackers-root-access/
Trojan Transforms Linux Devices into Proxies for Malicious Traffic

Security researchers have uncovered a new trojan that targets Linux devices that is capable of transforming infected machines into proxy servers and relay malicious traffic, hiding the true origin of attacks or other nefarious activities. [...]

https://www.bleepingcomputer.com/news/security/trojan-transforms-linux-devices-into-proxies-for-malicious-traffic/