Category: Bleeping Computer

WordPress
31
Mar
2025

Hackers abuse WordPress MU-Plugins to hide malicious code

Hackers are utilizing the WordPress mu-plugins (“Must-Use Plugins”) directory to stealthily run malicious code on every page while evading detection….

North Korea
31
Mar
2025

North Korean hackers adopt ClickFix attacks to target crypto firms

The notorious North Korean Lazarus hacking group has reportedly adopted ‘ClickFix’ tactics to deploy malware targeting job seekers in the…

Windows 11
30
Mar
2025

Microsoft tests new Windows 11 tool to remotely fix boot crashes

Microsoft has begun testing a new Windows 11 tool called Quick Machine Recovery, which is designed to remotely deploy fixes…

WIndows 11
30
Mar
2025

Microsoft’s killing script used to avoid Microsoft Account in Windows 11

Microsoft has removed the ‘BypassNRO.cmd’ script from Windows 11 preview builds, which allowed users to bypass the requirement to use…

Crocodile
30
Mar
2025

New Crocodilus malware steals Android users’ crypto wallet keys

A newly discovered Android malware dubbed Crocodilus tricks users into providing the seed phrase for the cryptocurrency wallet using a warning to…

FBI
29
Mar
2025

U.S. seized $8.2 million in crypto linked to ‘Romance Baiting’ scams

The U.S. Department of Justice (DOJ) has seized over $8.2 million worth of USDT (Tether) cryptocurrency that was stolen via…

Sam
28
Mar
2025

Retail giant Sam’s Club investigates Clop ransomware breach claims

​Sam’s Club, an American warehouse supermarket chain owned by U.S. retail giant Walmart, is investigating claims of a Clop ransomware…

OpenAI
28
Mar
2025

OpenAI now pays researchers $100,000 for critical vulnerabilities

Artificial intelligence company OpenAI has announced a fivefold increase in the maximum bug bounty rewards for “exceptional and differentiated” critical…

Outlook
28
Mar
2025

Microsoft fixes button that restores classic Outlook client

​Two weeks ago, Microsoft said it was investigating an issue causing the new Outlook email client to crash when users…

Meerkat
28
Mar
2025

Phishing-as-a-service operation uses DNS-over-HTTPS for evasion

A newly discovered phishing-as-a-service (PhaaS) operation that researchers call Morphing Meerkat, has been using the DNS over HTTPS (DoH) protocol to…

Ubuntu
28
Mar
2025

New Ubuntu Linux security bypasses require manual mitigations

Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be enable a local attacker…

Oracle
28
Mar
2025

Oracle Health breach compromises patient data at US hospitals

A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from…