Category: Bleeping Computer
Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records…
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog,…
Apple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems. “Apple…
Microsoft announced today that hotpatching of security updates is now also available in preview on Windows 365 and Windows 11…
D-Link is warning customers to replace end-of-life VPN router models after a critical unauthenticated, remote code execution vulnerability was discovered that…
The new ‘Helldown’ ransomware operation is believed to target vulnerabilities in Zyxel firewalls to breach corporate networks, allowing them to…
The Ngioweb botnet, which supplies most of the 35,000 bots in the cybercriminal NSOCKS proxy service, is being disrupted as…
Microsoft is working on a new Windows “Quick Machine Recovery” feature that will allow IT administrators to use Windows Update…
Microsoft has shared more details about the new Windows 11 administrator protection security feature, which is available in preview and…
Microsoft announced today at its Ignite annual conference in Chicago, Illinois, that it’s expanding its bug bounty programs with Zero…
Spotify playlists and podcasts are being abused to push pirated software, game cheat codes, spam links, and “warez” sites. By…
Chinese threat actors use a custom post-exploitation toolkit named ‘DeepData’ to exploit a zero-day vulnerability in Fortinet’s FortiClient Windows VPN client…











