Category: Bleeping Computer

Hacker
07
Mar
2025

Microsoft says malvertising campaign impacted 1 million PCs

​Microsoft has taken down an undisclosed number of GitHub repositories used in a massive malvertising campaign that impacted almost one…

Webcam
06
Mar
2025

Ransomware gang encrypted network from a webcam to bypass EDR

The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim’s network, effectively circumventing Endpoint…

Secret Service
06
Mar
2025

US seizes domain of Garantex crypto exchange used by ransomware gangs

The U.S. Secret Service has seized the domain of the sanctioned Russian cryptocurrency exchange Garantex in collaboration with the Department…

Taylor Swift concert
06
Mar
2025

Cybercrime ‘crew’ stole $635,000 in Taylor Swift concert tickets

New York prosecutors say that two people working at a third-party contractor for the StubHub online ticket marketplace made $635,000…

vCiso Academy
06
Mar
2025

Turning MSPs and MSSPs into Cybersecurity Powerhouses

We’ve all heard a million times: growing demand for robust cybersecurity in the face of rising cyber threats is undeniable….

Ethereum
06
Mar
2025

Ethereum private key stealer on PyPI downloaded over 1,000 times

A malicious Python Package Index (PyPI)  package named “set-utils” has been stealing Ethereum private keys through intercepted wallet creation functions…

VMware
06
Mar
2025

Over 37,000 VMware ESXi servers vulnerable to ongoing attacks

Over 37,000 internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in…

Microsoft 365
06
Mar
2025

Microsoft 365 apps will prompt users to back up files in OneDrive

Starting mid-March 2025, Microsoft will start prompting users of its Microsoft 365 apps for Windows to back up their files…

Chrome
06
Mar
2025

Malicious Chrome extensions can spoof password managers in new attack

A newly devised “polymorphic” attack allows malicious Chrome extensions to morph into browser extensions, including password managers, crypto wallets, and banking…

Rayhunter
06
Mar
2025

Open-source tool ‘Rayhunter’ helps users detect Stingray attacks

The Electronic Frontier Foundation (EFF) has released a free, open-source tool named Rayhunter that is designed to detect cell-site simulators…

A hacker with a Flag of China
05
Mar
2025

Silk Typhoon hackers now target IT supply chains to breach networks

Microsoft warns that Chinese cyber-espionage threat group ‘Silk Typhoon’ has shifted its tactics, now targeting remote management tools and cloud…

US Treasury
05
Mar
2025

US charges Chinese hackers linked to critical infrastructure breaches

The US Justice Department has charged Chinese state security officers along with APT27 and i-Soon hackers for network breaches and…