Category: Bleeping Computer

Keep Aware extension piece
11
Sep
2025

The Buyer’s Guide to Browser Extension Management

While most enterprises lock down endpoints, harden networks, and scan for vulnerabilities, one of the riskiest vectors often slips through…

Microsoft Teams
11
Sep
2025

Microsoft adds malicious link warnings to Teams private chats

Microsoft Teams will automatically alert users when they send or receive a private message containing links that are tagged as…

SonicWall
11
Sep
2025

Akira ransomware exploiting critical SonicWall SSLVPN bug again

The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access control vulnerability, to gain unauthorized access to SonicWall devices. The…

Fake Microsoft Office add-in tools push malware via SourceForge
11
Sep
2025

New VMScape attack breaks guest-host isolation on AMD, Intel CPUs

A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU…

11
Sep
2025

New VMScape attack breaks guest-host isolation on AMD, Intel CPUs

A new Spectre-like attack dubbed VMScape allows a malicious virtual machine (VM) to leak cryptographic keys from an unmodified QEMU…

DDoS defender targeted in 1.5 Bpps denial-of-service attack
11
Sep
2025

DDoS defender targeted in 1.5 Bpps denial-of-service attack

A DDoS mitigation service provider in Europe was targeted in a massive distributed denial-of-service attack that reached 1.5 billion packets per…

AI-powered Cursor IDE vulnerable to prompt-injection attacks
10
Sep
2025

Cursor AI editor lets repos “autorun” malicious code on devices

A weakness in the Cursor code editor exposes developers to the risk of automatically executing tasks in a malicious repository as…

Microsoft
10
Sep
2025

Microsoft waives fees for Windows devs publishing to Microsoft Store

Microsoft announced that, starting today, individual Windows developers will no longer have to pay for publishing their applications on the…

Hackers left empty-handed after massive NPM supply-chain attack
10
Sep
2025

Hackers left empty-handed after massive NPM supply-chain attack

The largest supply-chain compromise in the history of the NPM ecosystem has impacted roughly 10% of all cloud environments, but…

Pixel 10 fights AI fakes with new Android photo verification tech
10
Sep
2025

Pixel 10 fights AI fakes with new Android photo verification tech

Google is integrating C2PA Content Credentials into the Pixel 10 camera and Google Photos, to help users distinguish between authentic,…

Specops man worrying
10
Sep
2025

Can I have a new password, please? The $400M question.

Back in August 2023, attackers tied to the Scattered Spider group didn’t exploit a zero-day vulnerability to hack Clorox. They…

Jaguar Land Rover
10
Sep
2025

Jaguar Land Rover confirms data theft after recent cyberattack

Jaguar Land Rover (JLR) confirmed today that attackers also stole “some data” during a recent cyberattack that forced it to shut…