Category: Bleeping Computer

Malware
10
Aug
2023

Exploring the Stealer Log Lifecycle

The first seven months of 2023 have seen a continued rapid evolution of the cybercrime ecosystem. Ransomware data exfiltration attacks,…

Key
10
Aug
2023

Dell Compellent hardcoded key exposes VMware vCenter admin creds

An unfixed hardcoded encryption key flaw in Dell’s Compellent Integration Tools for VMware (CITV) allows attackers to decrypt stored vCenter…

Bitcoin
09
Aug
2023

New BitForge cryptocurrency wallet flaws lets hackers steal crypto

Image: Midjourney Multiple zero-day vulnerabilities named ‘BitForge’ in the implementation of widely used cryptographic protocols like GG-18, GG-20, and Lindell…

Hacker monitoring monitors
09
Aug
2023

Hackers use open source Merlin post-exploitation toolkit in attacks

Ukraine is warning of a wave of attacks targeting state organizations using ‘Merlin,’ an open-source post-exploitation and command and control…

Data theft
09
Aug
2023

Missouri warns that health info was stolen in IBM MOVEit data breach

Missouri’s Department of Social Services warns that protected Medicaid healthcare information was exposed in a data breach after IBM suffered…

Rhysida ransomware
09
Aug
2023

Rhysida ransomware behind recent attacks on healthcare

The Rhysida ransomware operation is making a name for itself after a wave of attacks on healthcare organizations has forced…

Computer head guy holding his hands up
09
Aug
2023

Popular open source project Moq criticized for quietly collecting data

Open source project Moq (pronounced “Mock”) has drawn sharp criticism for quietly including a controversial dependency in its latest release. Distributed…

Microsoft 365
09
Aug
2023

EvilProxy phishing campaign targets 120,000 Microsoft 365 users

EvilProxy is becoming one of the more popular phishing platforms to target MFA-protected accounts, with researchers seeing 120,000 phishing emails…

Outpost24 IoT header image
09
Aug
2023

Preventative medicine for securing IoT tech in healthcare organizations

The widespread adoption of a digital transformation workspace and the shift to web applications has led to a global rise…

Google Chrome
09
Aug
2023

Google to fight hackers with weekly Chrome security updates

Google has changed the Google Chrome security updates schedule from bi-weekly to weekly to address the growing patch gap problem…

VSCode
09
Aug
2023

Microsoft Visual Studio Code flaw lets extensions steal passwords

Microsoft’s Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve…

AMD
08
Aug
2023

New Inception attack leaks sensitive data from all AMD Zen CPUs

Researchers have discovered a new and powerful transient execution attack called ‘Inception’ that can leak privileged secrets and data using…