Category: Bleeping Computer
A set of three distinct but related attacks, dubbed ‘Clone2Leak,’ can leak credentials by exploiting how Git and its credential…
Ransomware actors targeting ESXi bare metal hypervisors are leveraging SSH tunneling to persist on the system while remaining undetected. VMware…
UnitedHealth has revealed that 190 million Americans had their personal and healthcare data stolen in the Change Healthcare ransomware attack,…
UK telecommunications company TalkTalk is investigating a third-party supplier data breach after a threat actor began selling alleged customer data…
New York State has announced a $2,000,000 settlement with PayPal over charges it failed to comply with the state’s cybersecurity regulations,…
Zyxel is warning that a bad security signature update is causing critical errors for USG FLEX or ATP Series firewalls, including putting…
Microsoft has reminded Windows administrators that driver synchronization in Windows Server Update Services (WSUS) will be deprecated on April 18,…
A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account…
Security researchers have discovered an arbitrary account takeover flaw in Subaru’s Starlink service that could let attackers track, control, and hijack vehicles in…
A threat actor targeted low-skilled hackers, known as “script kiddies,” with a fake malware builder that secretly infected them with…
Security Information and Event Management (SIEM) systems are now a critical component of enterprise security operations, helping organizations detect, respond…
Microsoft says outdated Exchange servers cannot receive new emergency mitigation definitions because an Office Configuration Service certificate type is being…