Category: Bleeping Computer
Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core vulnerabilities….
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware…
Proton has launched Proton Authenticator, a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android, and iOS. 2FA authenticator…
Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance, targeted scanning, and brute-forcing…
An inside look at a ClickFix campaign and a real-world attack, its next iteration (FileFix), and how to prevent it…
An inside look at a ClickFix campaign and a real-world attack, its next iteration (FileFix), and how to prevent it…
A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been linked to the ShinyHunters…
The Python Software Foundation warned users this week that threat actors are trying to steal their credentials in phishing attacks…
The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram Micro, allegedly stolen from…
Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme ‘Alone,’ to achieve remote…
The UNC2891 hacking group, also known as LightBasin, used a 4G-equipped Raspberry Pi hidden in a bank’s network to bypass…
Apple has released security updates to address a high-severity vulnerability that has been exploited in zero-day attacks targeting Google Chrome…











