BleepingComputer
10.4K subscribers
41 photos
24.6K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Dozens of US news sites hacked in WastedLocker ransomware attacks

The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect the employees of over 30 major US private firms using fake software update alerts displayed by the malicious SocGholish JavaScript-based framework. [...]

https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/
US Govt shares tips on defending against cyberattacks via Tor

The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor anonymity network. [...]

https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/
Federal Reserve shares tips on mitigating synthetic identity fraud

The U.S. Federal Reserve today issued guidance on how financial organizations from the United States can mitigate payment fraud attempts scammers carry out with the help of synthetic identity accounts.  [...]

https://www.bleepingcomputer.com/news/security/federal-reserve-shares-tips-on-mitigating-synthetic-identity-fraud/
Hundreds arrested after encrypted messaging network takeover

European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups. [...]

https://www.bleepingcomputer.com/news/security/hundreds-arrested-after-encrypted-messaging-network-takeover/
Surge of MongoDB ransom attacks use GDPR as extortion leverage

A flood of attacks is targeting unsecured MongoDB servers and wiping their databases. Left behind are notes demanding a ransom payment, or the data will be leaked, and the owners reported for GDPR violations. [...]

https://www.bleepingcomputer.com/news/security/surge-of-mongodb-ransom-attacks-use-gdpr-as-extortion-leverage/
Microsoft Defender ATP now helps secure network devices

Microsoft Defender Advanced Threat Protection (ATP) can now assess the collective security configuration state of devices on an enterprise network with the help of a new feature dubbed Microsoft Secure Score for Devices. [...]

https://www.bleepingcomputer.com/news/security/microsoft-defender-atp-now-helps-secure-network-devices/
F5 patches critical BIG-IP ADC remote code execution vulnerability

F5 Networks (F5) patched a critical remote code execution (RCE) vulnerability found in undisclosed pages of Traffic Management User Interface (TMUI) of the BIG-IP application delivery controller (ADC). [...]

https://www.bleepingcomputer.com/news/security/f5-patches-critical-big-ip-adc-remote-code-execution-vulnerability/
The Week in Ransomware - July 3rd 2020 - Yes, Macs need antivirus

Many macOS users, including my family and friends, have been under the impression that Macs are not affected by malware and thus do not need security software. After this week, I hope the point is clear; that assumption is wrong, and Macs need antivirus software. [...]

https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-3rd-2020-yes-macs-need-antivirus/