Category: Bleeping Computer

Person typing on a keyboard
19
Jan
2024

Leaked Credentials, Data Breaches and Dark Web Markets

Infostealer malware is one of the most substantial and underappreciated risk vectors for corporate information security teams. Infostealers infect computers,…

Ivanti
19
Jan
2024

Critical Ivanti auth bypass bug now actively exploited

CISA warns that a critical authentication bypass vulnerability in Ivanti’s Endpoint Manager Mobile (EPMM) and MobileIron Core device management software…

TeamViewer logo
19
Jan
2024

TeamViewer abused to breach networks in new ransomware attacks

Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on…

Windows 11
18
Jan
2024

Microsoft tests instant access to Android photos in Windows 11

Microsoft plans to provide Windows 11 users with almost instant access to photos and screenshots they’ve taken on their Android smartphones….

K-State
18
Jan
2024

Kansas State University cyberattack disrupts IT network and services

Kansas State University (K-State) announced it is managing a cybersecurity incident that has disrupted certain network systems, including VPN, K-State…

Haier
18
Jan
2024

Haier hits Home Assistant plugin dev with takedown notice

Appliances giant Haier issued a takedown notice to a software developer for creating Home Assistant integration plugins for the company’s…

Department of Justice
18
Jan
2024

US govt wants BreachForums admin sentenced to 15 years in prison

The United States government has recommended that Conor Brian Fitzpatrick, the creator and lead administrator of the now-defunct BreachForums hacking…

Docker
18
Jan
2024

Docker hosts hacked in ongoing website traffic theft scheme

A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing…

Atlassian
18
Jan
2024

Atlassian outage affecting multiple cloud services

Multiple Atlassian Jira products are experiencing an ongoing outage as of this morning. Users of Jira Work management, Jira Software,…

France demands Apple pull iPhone 12 due to high RF radiation levels
18
Jan
2024

iShutdown scripts can help detect iOS spyware on your iPhone

Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices…

CISA
18
Jan
2024

CISA pushes federal agencies to patch Citrix RCE within a week

Today, CISA ordered U.S. federal agencies to secure their systems against three recently patched Citrix NetScaler and Google Chrome zero-days…

18
Jan
2024

Have I Been Pwned adds 71 million emails from Naz.API stolen account list

Have I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to…