New Windows 11 policy lets admins control optional updates installation

Microsoft now provides administrators with a new Windows 11 policy that controls how monthly non-security preview updates are installed on enterprise devices. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Windows 11 KB5029351 preview update released with Search fixes

Microsoft has released the optional August 2023 cumulative update for Windows 11, version 22H2, with fixes for several issues affecting the Search app. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New HiatusRAT malware attacks target US Defense Department

In a new HiatusRAT malware campaign, threat actors have targeted a server belonging to the U.S. Department of Defense in what researchers described as a reconnaissance attack. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft Excel to let you run Python scripts as formulas

Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating data. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Akira ransomware targets Cisco VPNs to breach organizations

There's mounting evidence that Akira ransomware targets Cisco VPN (virtual private network) products as an attack vector to breach corporate networks, steal, and eventually encrypt data. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Carderbee hacking group hits Hong Kong orgs in supply chain attack

A previously unidentified APT hacking group named 'Carderbee' was observed attacking organizations in Hong Kong and other regions in Asia, using legitimate software to infect targets' computers with the PlugX malware. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

TP-Link smart bulbs can let hackers steal your WiFi password

Researchers from Italy and the UK have discovered four vulnerabilities in the TP-Link Tapo L530E smart bulb and TP-Link's Tapo app, which could allow attackers to steal their target's WiFi password. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Sneaky Amazon Google ad leads to Microsoft support scam

A legitimate-looking ad for Amazon in Google search results redirects visitors to a Microsoft Defender tech support scam that locks up their browser. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Ongoing Duo outage causes Azure Auth authentication errors

Cisco-owned multi-factor authentication (MFA) provider Duo Security is investigating an ongoing outage that has been causing authentication failures and errors starting three hours ago. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Ivanti warns of new actively exploited MobileIron zero-day bug

US-based IT software company Ivanti warned customers today that a critical Sentry API authentication bypass vulnerability is being exploited in the wild. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Japanese watchmaker Seiko breached by BlackCat ransomware gang

The BlackCat/ALPHV ransomware gang has added Seiko to its extortion site, claiming responsibility for a cyberattack disclosed by the Japanese firm earlier this month. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hands on with Windows 11's 'never combine' taskbar feature

In its upcoming 23H2 release slated for fall, one of the standout features that has caught the eye of many is the 'never combine mode' for the taskbar. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Google Chrome to warn when installed extensions are malware

Google is testing a new feature in the Chrome browser that will warn users when an installed extension has been removed from the Chrome Web Store, usually indicative of it being malware. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Cuba ransomware uses Veeam exploit against critical U.S. organizations

The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT firms in Latin America, using a combination of old and new tools. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hackers use VPN provider's code certificate to sign malware

The China-aligned APT (advanced persistent threat) group known as 'Bronze Starlight' was seen targeting the Southeast Asian gambling industry with malware signed using a valid certificate used by the Ivacy VPN provider. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Rust devs push back as Serde project ships precompiled binaries

Serde, a popular Rust (de)serialization project, has decided to ship its serde_derive macro as a precompiled binary. This has generated a fair amount of concern among some developers who highlight the future legal and technical issues this may pose, along with a potential for sup … | Continue reading


@bleepingcomputer.com | 1 year ago

The Week in Ransomware - August 18th 2023 - LockBit on Thin Ice

While there was quite a bit of ransomware news this week, the highlighted story was the release of Jon DiMaggio's third article in the Ransomware Diaries series, with the focus of this article on the LockBit ransomware operation. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

WinRAR flaw lets hackers run programs when you open RAR archives

A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can execute commands on a computer simply by opening an archive. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hotmail email delivery fails after Microsoft misconfigures DNS

Hotmail users worldwide have problems sending emails, with messages flagged as spam or not delivered after Microsoft misconfigured the domain's DNS SPF record. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Interpol arrests 14 suspected cybercriminals for stealing $40 million

An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation codenamed 'Africa Cyber Surge II,' launched in April 2023. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft: BlackCat's Sphynx ransomware embeds Impacket, RemCom

Microsoft has discovered a new version of the BlackCat ransomware that embeds the Impacket networking framework and the Remcom hacking tool, both enabling spreading laterally across a breached network. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hackers ask $120,000 for access to multi-billion auction house

Hackers have breached the network of a major auction house and offered access to whoever was willing to pay $120,000. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft PowerShell Gallery vulnerable to spoofing, supply chain attacks

Lax policies for package naming on Microsoft's PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground for massive supply chain attacks. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Phishing campaign steals accounts for Zimbra email servers worlwide

An ongoing phishing campaign has been underway since at least April 2023 that attempts to steal credentials for Zimbra Collaboration email servers worldwide. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Windows Task Manager refresh can be paused using CTRL key

A very useful and previously unknown Windows tip was revealed this week, where you can halt process jumping in Task Manager by holding down the Ctrl key on your keyboard, allowing easier access to a listed process. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Thousands of Android APKs use compression trick to thwart analysis

Threat actors increasingly distribute malicious Android APKs (packaged app installers) that resist decompilation using unsupported, unknown, or heavily tweaked compression algorithms. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Triple Extortion Ransomware and the Cybercrime Supply Chain

Ransomware attacks continue to grow both in sophistication and quantity. Learn more from Flare about ransomware operation's increasing shift to triple extortion. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

File sharing site Anonfiles shuts down due to overwhelming abuse

Anonfiles, a popular service for sharing files anonymously, has shut down after saying it can no longer deal with the overwhelming abuse by its users. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

CISA warns of critical Citrix ShareFile flaw exploited in the wild

CISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown actors and has added the flaw to its catalog of known security flaws exploited in the wild. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Google released first quantum-resilient FIDO2 key implementation

Google has announced the first open-source quantum resilient FIDO2 security key implementation, which uses a unique ECC/Dilithium hybrid signature schema co-created with ETH Zurich. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Massive 400,000 proxy botnet built with stealthy malware infections

A new campaign involving the delivery of proxy server apps to Windows systems has been uncovered, where users are reportedly involuntarily acting as residential exit nodes controlled by a private company. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Major U.S. energy org targeted in QR code phishing attack

A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious emails into inboxes and bypass security. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Just announced: AI and security standards keynotes at mWISE

Get ready for the mWISE cybersecurity conference from Mandiant, taking place September 18-20, 2023 in Washington, DC. mWISE just announced new keynote panels focused on Artificial Intelligence (AI) and advanced adversaries. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Ivanti Avalanche impacted by critical pre-auth stack buffer overflows

Two stack-based buffer overflows collectively tracked as CVE-2023-32560 impact Ivanti Avalanche, an enterprise mobility management (EMM) solution designed to manage, monitor, and secure a wide range of mobile devices. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

LinkedIn accounts hacked in widespread hijacking campaign

LinkedIn is being targeted in a wave of account hacks resulting in many accounts being locked out for security reasons or ultimately hijacked by attackers. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Almost 2,000 Citrix NetScaler servers backdoored in hacking campaign

A threat actor has compromised close to 2,000 thousand Citrix NetScaler servers in a massive campaign exploiting the critical-severity remote code execution tracked as CVE-2023-3519. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Raccoon Stealer malware returns with new stealthier version

The developers of Raccoon Stealer information-stealing malware have ended their 6-month hiatus from hacker forums to promote a new 2.3.0 version of the malware to cyber criminals. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New CVE-2023-3519 scanner detects hacked Citrix ADC, Gateway devices

Mandiant has released a scanner to check if a Citrix NetScaler Application Delivery Controller (ADC) or NetScaler Gateway Appliance was compromised in widespread attacks exploiting the CVE-2023-3519 vulnerability.  [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Back to school security against ransomware attacks on K-12 and colleges

As we get back to school, K-12 and colleges are increasingly at risk from ransomware and data theft attacks. Learn more from Specops Software on the steps IT teams at education institutes can take to protect their care orgs from disruption and stolen data. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Threat actors use beta apps to bypass mobile app store security

The FBI is warning of a new tactic used by cybercriminals where they promote malicious "beta" versions of cryptocurrency investment apps on popular mobile app stores that are then used to steal crypto. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Discord.io confirms breach after hacker steals data of 760K users

The Discord.io custom invite service has temporarily shut down after suffering a data breach exposing the information of 760,000 members. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Over 100K hacking forums accounts exposed by info-stealing malware

Researchers discovered 120,000 infected systems that contained credentials for cybercrime forums. Many of the computers belong to hackers, the researchers say. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft enables Windows Kernel CVE-2023-32019 fix for everyone

Microsoft has enabled a fix for a Kernel information disclosure vulnerability by default for everyone after previously disabling it out of concerns it could introduce breaking changes to Windows. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

FBI warns of increasing cryptocurrency recovery schemes

The FBI is warning of an increase in scammers pretending to be recovery companies that can help victims of cryptocurrency investment scams recover lost assets. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Monti ransomware targets VMware ESXi servers with new Linux locker

The Monti ransomware has returned to action after a two-month hiatus, now targeting primarily legal and government organizations, and VMware ESXi servers using a new Linux variant that is vastly different from its predecessors. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Criminal IP Teams Up with PolySwarm to Strengthen Threat Detection

The addition of Criminal IP as a new contributor to PolySwarm's malicious URL detection represents a significant leap in specialized threat identification. Learn more from Criminal IP about this new collaboration. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Colorado warns 4 million of data stolen in IBM MOVEit breach

The Colorado Department of Health Care Policy & Financing (HCPF) is alerting more than four million individuals of a data breach that impacted their personal and health information. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

MaginotDNS attacks exploit weak checks for DNS cache poisoning

A team of researchers from UC Irvine and Tsinghua University has developed a new powerful cache poisoning attack named 'MaginotDNS,' that targets Conditional DNS (CDNS) resolvers and can compromise entire TLDs top-level domains. [...] | Continue reading


@bleepingcomputer.com | 1 year ago