Category: Bleeping Computer

International Criminal Court
19
Sep
2023

Hackers breached International Criminal Court’s systems last week

The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached….

GitLab
19
Sep
2023

GitLab urges users to install security updates for critical pipeline flaw

GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users…

Exchange Online
19
Sep
2023

Microsoft to start retiring Exchange Web Services in October 2026

Microsoft said today that the Exchange Web Services (EWS) API for Exchange Online and Office 365 will be retired in approximately…

Cyberattack on telecom provider
19
Sep
2023

Hackers backdoor telecom providers with new HTTPSnoop malware

New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat…

WSL
18
Sep
2023

Windows Subsystem for Linux gets new ‘mirrored’ network mode

Microsoft has released Windows Subsystem for Linux (WSL) 2.0.0 with a set of new opt-in experimental features, including a new…

YouTube
18
Sep
2023

APT36 state hackers infect Android devices using YouTube app clones

The APT36 hacking group, aka ‘Transparent Tribe,’ has been observed using at least three Android apps that mimic YouTube to infect…

Juniper
18
Sep
2023

Thousands of Juniper devices vulnerable to unauthenticated RCE flaw

An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers…

Paint
18
Sep
2023

Microsoft Paint finally gets support for layers and transparency

​Microsoft is finally rolling out support for layers and image transparency to the Paint image editor application 38 years after…

Bumblebee
18
Sep
2023

Bumblebee malware returns in new attacks abusing WebDAV folders

The malware loader ‘Bumblebee’ has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse…

Specops Compromised Passwords
18
Sep
2023

Are your end-users’ passwords compromised? Here’s how to check.

Passwords have long been used as the primary gatekeepers of digital security, yet they can also be a weak link…

Microsoft Azure
18
Sep
2023

Microsoft leaks 38TB of private data via unsecured Azure storage

The Microsoft AI research division accidentally leaked dozens of terabytes of sensitive data while contributing open-source AI learning models to…

China
18
Sep
2023

New SprySOCKS Linux malware used in cyber espionage attacks

A Chinese espionage-focused hacker tracked as ‘Earth Lusca’ was observed targeting government agencies in multiple countries, using a new Linux…