Hackers hijack Citrix NetScaler login pages to steal credentials

Hackers are conducting a large-scale campaign to exploit the recent CVE-2023-3519 flaw in Citrix NetScaler Gateways to steal user credentials. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

HelloKitty ransomware source code leaked on hacking forum

A threat actor has leaked the complete source code for the first version of the HelloKitty ransomware on a Russian-speaking hacking forum, claiming to be developing a new, more powerful encryptor. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Google Chrome's organize tabs will automatically reorder tabs

In a bid to upgrade user experience, the Chrome team is developing an "Organise Tabs" feature, soon to be seen at the top left corner of the browser, adjacent to the tab search function. This new addition would be a natural extension of Tab Groups functionality. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft 365 admins warned of new Google anti-spam rules

Microsoft urged Microsoft 365 email senders this week to authenticate outbound messages following new anti-spam rules for bulk senders announced earlier this week by Google. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Third Flagstar Bank data breach since 2021 affects 800,000 customers

Flagstar Bank is warning that over 800,000 US customers had their personal information stolen by cybercriminals due to a breach at a third-party service provider. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Bounty offered for secret NSA seeds behind NIST elliptic curves algo

A bounty of $12,288 has been announced for the first person to crack the NIST elliptic curves seeds and discover the original phrases that were hashed to generate them. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

D.C. Board of Elections confirms voter data stolen in site hack

The District of Columbia Board of Elections (DCBOE) is currently probing a data leak involving an unknown number of voter records following breach claims from a threat actor known as RansomedVC. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Blackbaud agrees to $49.5 million settlement for ransomware data breach

Cloud computing provider Blackbaud reached a $49.5 million agreement with attorneys general from 49 U.S. states to settle a multi-state investigation of a May 2020 ransomware attack and the resulting data breach. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

FTC warns of ‘staggering’ losses to social media scams since 2021

The Federal Trade Commission says Americans have lost at least $2.7 billion to social media scams since 2021, with the real number likely many times larger due to unreported incidents.  [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Genetics firm 23andMe says user data stolen in credential stuffing attack

23andMe has confirmed to BleepingComputer that it is aware of user data from its platform circulating on hacker forums and attributes the leak to a credential-stuffing attack. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

MGM Resorts says ransomware attack cost $100 million, data stolen

MGM Resorts reveals that last month's cyberattack cost the company $100 million and allowed the hackers to steal customers' personal information. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft officially removes Cortana for Windows 11 Insiders

Microsoft finally removed the Cortana standalone app from Windows 11 in the latest preview build for Insiders in the Canary Channel. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Exploits released for Linux flaw giving root on major distros

Proof-of-concept exploits have already surfaced online for a high-severity flaw in GNU C Library's dynamic loader, allowing local attackers to gain root privileges on major Linux distributions. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

China-linked cyberspies backdoor semiconductor firms with Cobalt Strike

Hackers engaging in cyber espionage have targeted Chinese-speaking semiconductor companies with TSMC-themed lures that infect them with Cobalt Strike beacons. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

NSA and CISA reveal top 10 cybersecurity misconfigurations

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) revealed today the top ten most common cybersecurity misconfigurations discovered by their red and blue teams in the networks of large organizations. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Amazon to make MFA mandatory for 'root' AWS accounts by mid-2024

Amazon will require all privileged AWS (Amazon Web Services) accounts to use multi-factor authentication (MFA) for stronger protection against account hijacks leading to data breaches, starting in mid-2024. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft releases new, faster Teams app for Windows and Mac PCs

A new, redesigned, and faster Microsoft Teams application is generally available for all Windows and macOS users starting today. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Lyca Mobile investigates customer data leak after cyberattack

Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have also compromised customer data. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hundreds of malicious Python packages found stealing sensitive data

A malicious campaign that researchers observed growing more complex over the past half year, has been planting on open-source platforms hundreds of info-stealing packages that counted about 75,000 downloads. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Apple emergency update fixes new zero-day used to hack iPhones

Apple released emergency security updates to patch a new zero-day security flaw exploited in attacks targeting iPhone and iPad users. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Atlassian patches critical Confluence zero-day exploited in attacks

Australian software company Atlassian released emergency security updates to fix a maximum severity zero-day vulnerability in its Confluence Data Center and Server software, which has been exploited in attacks. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Researchers warn of 100,000 industrial control systems exposed online

About 100,000 industrial control systems (ICS) were found on the public web, exposed to attackers probing them for vulnerabilities and at risk of unauthorized access. Among them are power grids, traffic light systems, security and water systems. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Cisco fixes hard-coded root credentials in Emergency Responder

Cisco released security updates to fix a Cisco Emergency Responder (CER) vulnerability that let attackers log into unpatched systems using hard-coded credentials. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft: Hackers target Azure cloud VMs via breached SQL servers

Hackers have been observed trying to breach cloud environments through Microsoft SQL Servers vulnerable to SQL injection. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Enhancing your application security program with continuous monitoring

Pen Testing as a Service and Traditional web application pen testing offers two different approaches to securing your applications. Learn more from Outpost24 on which approach may be best for your business. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Sony confirms data breach impacting thousands in the U.S.

Sony Interactive Entertainment (Sony) has notified current and former employees and their family members about a cybersecurity breach that exposed personal information. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Emergency alert on US phones and TVs today — Don’t worry, it’s just a test

The U.S. Federal Emergency Management Agency (FEMA) and the Federal Communications Commission (FCC) will run an emergency alert test today to check Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA) capabilities nationwide. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New 'Looney Tunables' Linux bug gives root on major distros

A new Linux vulnerability known as 'Looney Tunables' enables local attackers to gain root privileges by exploiting a buffer overflow weakness in the GNU C Library's ld.so dynamic loader. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft now lets you play a game during Windows 11 installs

Microsoft has introduced a new twist to the Windows 11 installation and update process, transforming it from a mundane task into an enjoyable experience. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Google to bolster phishing and malware delivery defenses in 2024

Google will introduce new sender guidelines in February to bolster email security against phishing and malware delivery by mandating bulk senders to authenticate their emails and adhere to stricter spam thresholds [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Android October security update fixes zero-days exploited in attacks

Google has released the October 2023 security updates for Android, addressing 54 unique vulnerabilities, including two known to be actively exploited. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

ShellTorch flaws expose AI servers to code execution attacks

A set of critical vulnerabilities dubbed 'ShellTorch' in the open-source TorchServe AI model-serving tool impact tens of thousands of internet-exposed servers, some of which belong to large organizations. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers

Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in attacks. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft Edge, Teams get fixes for zero-days in open-source libraries

Microsoft released emergency security updates for Edge, Teams, and Skype to patch two zero-day vulnerabilities in open-source libraries used by the three products. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

EvilProxy uses indeed.com open redirect for Microsoft 365 phishing

A recently uncovered phishing campaign is targeting Microsoft 365 accounts of key executives in U.S.-based organizations by abusing open redirects from the Indeed employment website for job listings. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft Defender no longer flags Tor Browser as malware

For Windows users who frequently use the TorBrowser, there's been a pressing concern. Recent versions of the TorBrowser, specifically because of the tor.exe file it contained, were being flagged as potential threats by Windows Defender. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Exim patches three of six zero-day bugs disclosed last week

Exim developers have released patches for three of the zero-days disclosed last week through Trend Micro's Zero Day Initiative (ZDI), one of them allowing unauthenticated attackers to gain remote code execution. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New BunnyLoader threat emerges as a feature-rich malware-as-a-service

Security researchers discovered a new malware-as-a-service (MaaS) named 'BunnyLoader' advertised on multiple hacker forums as a fileless loader that can steal and replace the contents of the system clipboard. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Ransomware gangs now exploiting critical TeamCity RCE flaw

Ransomware gangs are now targeting a recently patched critical vulnerability in JetBrains' TeamCity continuous integration and deployment server. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Exploit available for critical WS_FTP bug exploited in attacks

Over the weekend, security researchers released a proof-of-concept (PoC) exploit for a maximum severity vulnerability in Progress Software's WS_FTP Server file sharing solution. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Arm warns of Mali GPU flaws likely exploited in targeted attacks

Arm in a security advisory today is warning of an actively exploited vulnerability affecting the widely-used Mali GPU drivers. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Motel One discloses data breach following ransomware attack

The Motel One Group has announced that it has been targeted by ransomware actors who managed to steal some customer data, including the details of 150 credit cards. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

FBI warns of surge in 'phantom hacker' scams impacting elderly

The FBI issued a public service announcement warning of a significant increase in 'phantom hacker' scams targeting senior citizens across the United States. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Amazon sends Mastercard, Google Play gift card order emails by mistake

Amazon mistakenly sent out purchase confirmation emails for Hotels.com, Google Play, and Mastercard gift cards to customers, making many worried their accounts were compromised. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

The LostTrust ransomware operation is believed to be a rebrand of MetaEncryptor, utilizing almost identical data leak sites and encryptors. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New Marvin attack revives 25-year-old decryption flaw in RSA

A flaw related to the PKCS #1 v1.5 padding in SSL servers discovered in 1998 and believed to have been resolved still impacts several widely-used projects today. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Cloudflare DDoS protections ironically bypassed using Cloudflare

Cloudflare's Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security controls. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft fixes Outlook prompts to reopen closed windows

Microsoft has resolved a known issue that caused Outlook Desktop to unexpectedly prompt users to reopen previously closed windows. [...] | Continue reading


@bleepingcomputer.com | 1 year ago