Category: Bleeping Computer

Microsoft
20
Feb
2025

Microsoft fixes Power Pages zero-day bug exploited in attacks

Microsoft has issued a security bulletin for a high-severity elevation of privilege vulnerability in Power Pages, which hackers exploited as…

Dracula hacking
20
Feb
2025

Darcula PhaaS can now auto-generate phishing kits for any brand

The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted features, the…

Windows 11
20
Feb
2025

Microsoft testing fix for Windows 11 bug breaking SSH connections

Microsoft is not testing a fix for a longstanding known issue that is breaking SSH connections on some Windows 11…

Ransomware
20
Feb
2025

New NailaoLocker ransomware used against EU healthcare orgs

A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024….

Ghost
19
Feb
2025

Ghost ransomware breached orgs in 70 countries

CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries,…

Shhing Hacker
19
Feb
2025

Phishing attack hides JavaScript using invisible Unicode trick

A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in phishing attacks…

Apple
19
Feb
2025

New FrigidStealer infostealer infects Macs via fake browser updates

The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns…

Genea
19
Feb
2025

Australian fertility services giant Genea hit by security breach

​Genea, one of Australia’s largest fertility services providers, disclosed that unknown attackers breached its network and accessed data stored on compromised…

WinRAR
19
Feb
2025

New WinRAR version strips Windows metadata to increase privacy

WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to…

KeepAware header image
19
Feb
2025

Why Your Browser is the Next Cybersecurity Battleground

For years, defensive security strategies have focused on three core areas: network, endpoint, and email. Meanwhile, the browser, where most…

Palo Alto Networks
19
Feb
2025

Palo Alto Networks tags new firewall bug as exploited in attacks

Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws…

Hackers compromise Signal accounts by exploiting the device-linking feature
19
Feb
2025

Russian phishing campaigns exploit Signal’s device-linking feature

Russian threat actors have been launching phishing campaigns that exploit the legitimate “Linked Devices” feature in the Signal messaging app…