Category: Bleeping Computer

2022
03
Jan
2023

BleepingComputer’s most popular cybersecurity stories of 2022

It was a big year for cybersecurity in 2022 with massive cyberattacks and data breaches, innovative phishing attacks, privacy concerns,…

2022
03
Jan
2023

BleepingComputer’s most popular technology stories of 2022

2022 is over, and it’s been filled with a wide assortment of stories ranging from the impact of Russia’s invasion…

Ransomware impacts over 200 govt, edu, healthcare orgs in 2022
03
Jan
2023

Ransomware impacts over 200 govt, edu, healthcare orgs in 2022

Ransomware attacks in 2022 impacted more than 200 hundred larger organizations in the U.S. public sector in the government, educational,…

Ransomware gang cloned victim’s website to leak stolen data
01
Jan
2023

Ransomware gang cloned victim’s website to leak stolen data

The ALPHV ransomware operators have gotten creative with their extortion tactic and, in at least one case, created a replica…

SickKids children
01
Jan
2023

Ransomware gang apologizes, gives SickKids hospital free decryptor

The LockBit ransomware gang has released a free decryptor for the Hospital for Sick Children (SickKids), saying one of its…

LockBit ransomware claims attack on Port of Lisbon in Portugal
01
Jan
2023

LockBit ransomware claims attack on Port of Lisbon in Portugal

A cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day, has been claimed by…

pypi
01
Jan
2023

PyTorch discloses malicious dependency chain compromise over holidays

PyTorch has identified a malicious dependency with the same name as the framework’s ‘torchtriton’ library. This has led to a successful compromise via the dependency…

Canadian mining firm shuts down mill after ransomware attack
30
Dec
2022

Canadian mining firm shuts down mill after ransomware attack

The Canadian Copper Mountain Mining Corporation (CMMC) in British Columbia has announced that it was the target of a ransomware attack…

New Linux malware uses 30 plugin exploits to backdoor WordPress sites
30
Dec
2022

New Linux malware uses 30 plugin exploits to backdoor WordPress sites

A previously unknown Linux malware has been exploiting 30 vulnerabilities in multiple outdated WordPress plugins and themes to inject malicious JavaScript. According to…

Ukraininan call center
30
Dec
2022

Ukraine shuts down fraudulent call center claiming 18,000 victims

A group of imposters operating out of a Ukrainian call center defrauded thousands of victims while pretending to be IT security…

Crypto platform 3Commas admits hackers stole API keys
29
Dec
2022

Crypto platform 3Commas admits hackers stole API keys

An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform….

Google Home speakers allowed hackers to snoop on conversations
29
Dec
2022

Google Home speakers allowed hackers to snoop on conversations

A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely…