Category: Bleeping Computer
The first seven months of 2023 have seen a continued rapid evolution of the cybercrime ecosystem. Ransomware data exfiltration attacks,…
An unfixed hardcoded encryption key flaw in Dell’s Compellent Integration Tools for VMware (CITV) allows attackers to decrypt stored vCenter…
Image: Midjourney Multiple zero-day vulnerabilities named ‘BitForge’ in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell…
Ukraine is warning of a wave of attacks targeting state organizations using ‘Merlin,’ an open-source post-exploitation and command and control…
Missouri’s Department of Social Services warns that protected Medicaid healthcare information was exposed in a data breach after IBM suffered…
The Rhysida ransomware operation is making a name for itself after a wave of attacks on healthcare organizations has forced…
Open source project Moq (pronounced “Mock”) has drawn sharp criticism for quietly including a controversial dependency in its latest release. Distributed…
EvilProxy is becoming one of the more popular phishing platforms to target MFA-protected accounts, with researchers seeing 120,000 phishing emails…
The widespread adoption of a digital transformation workspace and the shift to web applications has led to a global rise…
Google has changed the Google Chrome security updates schedule from bi-weekly to weekly to address the growing patch gap problem…
Microsoft’s Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve…
Researchers have discovered a new and powerful transient execution attack called ‘Inception’ that can leak privileged secrets and data using…











