Category: Bleeping Computer

ChatGPT
19
Jul
2025

New ChatGPT o3-alpha model hints at coding upgrade

ChatGPT’s o3 is OpenAI’s best model to date because it features reasoning, and it might get even better in the…

Russian hackers breach orgs to track aid routes to Ukraine
18
Jul
2025

UK ties GRU to stealthy Microsoft 365 credential-stealing malware

The UK National Cyber Security Centre (NCSC) has formally attributed ‘Authentic Antics’ espionage malware attacks to APT28 (Fancy Bear), a…

Windows 11
18
Jul
2025

Microsoft mistakenly tags Windows Firewall error log bug as fixed

Microsoft has mistakenly tagged an ongoing Windows Firewall error message bug as fixed in recent updates, stating that they are…

Russian alcohol retailer WineLab closes stores after ransomware attack
18
Jul
2025

Russian alcohol retailer WineLab closes stores after ransomware attack

WineLab, the retail store of the largest alcohol company in Russia, has closed its stores following a cyberattack that is…

Hand holding a cyber key
18
Jul
2025

New Phobos and 8base ransomware decryptor recover files for free

The Japanese police have released a Phobos and 8-Base ransomware decryptor that lets victims recover their files for free, with…

Hacker starting at a smartphone
18
Jul
2025

Hackers scanning for TeleMessage Signal clone flaw exposing passwords

Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and…

ChatGPT
18
Jul
2025

GPT-5 is coming, “we’ll see” if it creates a shockwave

OpenAI’s next foundational and state-of-the-art model, GPT-5, is still on its way after a delay. OpenAI won’t tell us the…

Citrix
18
Jul
2025

Citrix Bleed 2 exploited weeks before PoCs as Citrix denied attacks

A critical Citrix NetScaler vulnerability, tracked as CVE-2025-5777 and dubbed “CitrixBleed 2,” was actively exploited nearly two weeks before proof-of-concept…

Microsoft Teams voice calls abused to push Matanbuchus malware
18
Jul
2025

Microsoft Teams voice calls abused to push Matanbuchus malware

The Matanbuchus malware loader has been seen being distributed through social engineering over Microsoft Teams calls impersonating IT helpdesk. Matanbuchus is…

VMware
18
Jul
2025

VMware fixes four ESXi zero-day bugs exploited at Pwn2Own Berlin

VMware fixed four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that were exploited as zero-days during the Pwn2Own Berlin…

Android devices
17
Jul
2025

Google sues to disrupt BadBox 2.0 botnet infecting 10 million devices

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 malware botnet, accusing them of running…

AI hallucinations
17
Jul
2025

LameHug malware uses AI LLM to craft Windows data-theft commands in real-time

A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on…