Category: Bleeping Computer
A financially motivated threat actor using USB devices for initial infection has been found abusing legitimate online platforms, including GitHub,…
A proof-of-concept (PoC) exploit for a local privilege elevation flaw impacting at least seven Android original equipment manufacturers (OEMs) is…
Car rental company Europcar says it has not suffered a data breach and that shared customer data is fake after…
The FBI has disrupted the KV Botnet used by Chinese Volt Typhoon state hackers to evade detection during attacks targeting…
CISA has urged manufacturers of small office/home office (SOHO) routers to ensure their devices’ security against ongoing attacks attempting to hijack…
Johnson Controls International has confirmed that a September 2023 ransomware attack cost the company $27 million in expenses and led…
Today, Ivanti warned of two more vulnerabilities impacting Connect Secure, Policy Secure, and ZTA gateways, one of them a zero-day…
CyberArk has created an online version of ‘White Phoenix,’ an open-source ransomware decryptor targeting operations using intermittent encryption. The company announced…
Unprivileged attackers can get root access on multiple major Linux distributions in default configurations by exploiting a newly disclosed local…
The U.S. Department of Justice arrested and charged two more suspects for their involvement in the hacking of almost 68,000 DraftKings accounts in…
Julius Aleksanteri Kivimäki, the suspect believed to be behind an attack against one of Finland’s largest psychotherapy clinics, Vastaamo, was…
A mishandled GitHub token gave unrestricted access to Mercedes-Benz’s internal GitHub Enterprise Service, exposing source code to the public. Mercedes-Benz…











