DISH slapped with multiple lawsuits after ransomware cyber attack

Dish Network has been slapped with multiple class action lawsuits after it suffered a ransomware incident that was behind the company's multi-day "network outage." The legal actions aim to recover losses faced by DISH investors who were adversely affected by what has been dubbed … | Continue reading


@bleepingcomputer.com | 1 year ago

Twitter open-sources recommendation algorithm code

Twitter announced on Friday that it's open-sourcing the code behind the recommendation algorithm the platform uses to select the contents of the users' For You timeline. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

15 million public-facing services vulnerable to CISA KEV flaws

Over 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in CISA's KEV (known exploitable vulnerabilities) catalog. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

10-year-old Windows bug with 'opt-in' fix exploited in 3CX attack

A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still "opt-in" after all these years. Even worse, the fix is removed after upgrading to Windows 11. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Consumer lender TMX discloses data breach impacting 4.8 million people

TMX Finance and its subsidiaries TitleMax, TitleBucks, and InstaLoan have collectively disclosed a data breach that exposed the personal data of 4,822,580 customers. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Winter Vivern hackers exploit Zimbra flaw to steal NATO emails

A Russian hacking group tracked as TA473, aka 'Winter Vivern,' has been actively exploiting vulnerabilities in unpatched Zimbra endpoints since February 2023 to steal the emails of NATO officials, governments, military personnel, and diplomats. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft OneNote will block 120 dangerous file extensions

Microsoft has shared more information on what types of malicious embedded files OneNote will soon block to defend users against ongoing phishing attacks pushing malware. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Ukrainian cyberpolice busts fraud gang that stole $4.3 million

Ukraine's cyberpolice has arrested members of a fraud gang that stole roughly $4,300,000 from over a thousand victims across the EU. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

CISA orders agencies to patch bugs exploited to drop spyware

The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies today to patch a set of security vulnerabilities exploited as zero-days in recent attacks to install commercial spyware on mobile devices. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Realtek and Cacti flaws now actively exploited by malware botnets

Multiple malware botnets actively target Cacti and Realtek vulnerabilities in campaigns detected between January and March 2023, spreading ShellBot and Moobot malware. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft testing adaptive brightness on more Windows 11 devices

Microsoft says the new Windows 11 preview build rolling out today will allow Insiders to test the company's adaptive brightness feature on more systems. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Bing search results hijacked via misconfigured Microsoft app

A misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS attacks to potentially breach the accounts of Office 365 users. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New AlienFox toolkit steals credentials for 18 cloud services

A new modular toolkit called 'AlienFox' allows threat actors to scan for misconfigured servers to steal authentication secrets and credentials for cloud-based email services. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Cybersecurity firms warn of 3CX desktop app supply chain attack

A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company's customers in an ongoing supply chain attack. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Steam will drop support for Windows 7 and 8 in January 2024

Valve announced that its Steam online game platform will officially drop support for the Windows 7, Windows 8, and Windows 8.1 platforms starting January 1st, 2024. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

SafeMoon ‘burn’ bug abused to drain $8.9 million from liquidity pool

The SafeMoon token liquidity pool lost $8.9 million after a hacker exploited a newly created 'burn' smart contract function that artificially inflated the price, allowing the actors to sell SafeMoon at a much higher price. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

QNAP warns customers to patch Linux Sudo flaw in NAS devices

Taiwanese hardware vendor QNAP warns customers to secure their Linux-powered network-attached storage (NAS) devices against a high-severity Sudo privilege escalation vulnerability. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft Defender mistakenly tagging URLs as malicious

Microsoft Defender is mistakenly flagging legitimate links as malicious, with some customers having already received dozens of alert emails since the issues began over five hours ago. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Experts call for pause on AI training citing risks to humanity

AI professors and developers have co-signed an open letter to artificial intelligence labs, calling them to pause the development and training of AI systems more powerful than GPT-4 for at least six months. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Google finds more Android, iOS zero-days used to install spyware

Google's Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install commercial spyware and malicious apps on targets' devices. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Trojanized Tor browsers target Russians with crypto-stealing malware

A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency transactions. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Windows 11 KB5023774 update causes Red Dead Redemption 2 launch issues

Microsoft is investigating a known issue triggered by the KB5023774 March 2023 preview update and causing Red Dead Redemption 2 to stop opening on some devices. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

WiFi protocol flaw allows attackers to hijack network traffic

Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to trick access points into leaking network frames in plaintext form. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Windows 11 KB5023778 update adds promotions to the Start menu

Microsoft has released the optional March 2023 non-security preview update for Windows 11 that comes with a search box that matches the current color scheme and, unfortunately, with Start menu ads the company describes as "notifications for Microsoft accounts." [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft brings GPT-4-powered Security Copilot to incident response

Microsoft today announced Security Copilot, a new ChatGPT-like assistant powered by artificial intelligence that takes advantage of Microsoft's threat intelligence footprint to make faster decisions during incident response and to help with threat hunting and security reporting. … | Continue reading


@bleepingcomputer.com | 1 year ago

Crown Resorts confirms ransom demand after GoAnywhere breach

Crown Resorts, Australia's largest gambling and entertainment company, has confirmed that it suffered a data breach after its GoAnywhere secure file-sharing server was breached using a zero-day vulnerability. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Newly exposed APT43 hacking group targeting US orgs since 2018

A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the United States, Europe, Japan, and South Korea for the past five years. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

The End-User Password Mistakes Putting Your Organization at Risk

Though there are many ways to create passwords, not all are equally effective. It is important to consider the various ways a password-protected system can fail. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Latitude Financial data breach now impacts 14 million customers

Australian loan giant Latitude Financial Services (Latitude) is warning customers that its data breach is much more significant than initially stated, taking the number of affected individuals from 328,000 to 14 million. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Exchange Online to block emails from vulnerable on-prem servers

Microsoft is introducing a new Exchange Online security feature that will automatically start throttling and eventually block all emails sent from "persistently vulnerable Exchange servers" 90 days after the admins are pinged to secure them.  [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Apple fixes recently disclosed WebKit zero-day on older iPhones

Apple has released security updates to backport patches released last month, addressing an actively exploited zero-day bug for older iPhones and iPads. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New IcedID variants shift from bank fraud to malware delivery

New IcedID variants have been found without the usual online banking fraud functionality and instead focus on installing further malware on compromised systems. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New MacStealer macOS malware steals passwords from iCloud Keychain

A new info-stealing malware named MacStealer is targeting Mac users, stealing their credentials stored in the iCloud KeyChain and web browsers, cryptocurrency wallets, and potentially sensitive files. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft: New Teams is twice as fast, available for all in June

Microsoft has unveiled a faster and redesigned version of its Microsoft Teams communication and collaboration software that has begun rolling out to Windows users today as a preview release. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Hackers earn $1,035,000 for 27 zero-days exploited at Pwn2Own Vancouver

Pwn2Own Vancouver 2023 has ended with contestants earning $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several bug collisions) exploited between March 22 and 24. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Twitter takes down source code leaked online, hunts for downloaders

Twitter has taken down internal source code for its platform and tools that was leaked on GitHub for months. Now it's using a subpoena to search for those who leaked and downloaded its code. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

FBI: Business email compromise tactics used to defraud U.S. vendors

The Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar to business email compromise that allow less technical actors to steal various goods from vendors. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Emotet malware distributed as fake W-9 tax forms from the IRS

A new Emotet phishing campaign is targeting U.S. taxpayers by impersonating W-9 tax forms allegedly sent by the Internal Revenue Service and companies you work with. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft pushes OOB security updates for Windows Snipping tool flaw

Microsoft released an emergency security update for the Windows 10 and Windows 11 Snipping tool to fix the Acropalypse privacy vulnerability. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

New Dark Power ransomware claims 10 victims in its first month

A new ransomware operation named 'Dark Power' has appeared, and it has already listed its first victims on a dark web data leak site, threatening to publish the data if a ransom is not paid. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Inaudible ultrasound attack can stealthily control your phone, smart speaker

American university researchers have developed a novel attack which they named "Near-Ultrasound Inaudible Trojan" (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones, smart speakers, and other IoTs. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Russia’s Rostec allegedly can de-anonymize Telegram users

Russia's Rostec has reportedly bought a platform that allows it to uncover the identities of anonymous Telegram users, likely to be used to tamp down on unfavorable news out of the country. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2Own

On the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5 zero-day exploits targeting Windows 11, Ubuntu Desktop, and the VMware Workstation virtualization software. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

FBI confirms access to Breached cybercrime forum database

Today, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after the U.S. Justice Department also officially announced the arrest of its owner [...] | Continue reading


@bleepingcomputer.com | 1 year ago

The Week in Ransomware - March 24th 2023 - Clop overload

This week's news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services were breached using a zero-day vulnerability. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Microsoft shares tips on detecting Outlook zero-day exploitation

Microsoft today published a detailed guide aiming to help customers discover signs of compromise via exploitation of a recently patched Outlook zero-day vulnerability. [...] | Continue reading


@bleepingcomputer.com | 1 year ago

Australian police arrest four BEC actors who stole $1.7 million

The Australian Federal Police (AFP) has arrested four members of a cybercriminal syndicate that has laundered $1.7 million stolen from at least 15 victims between January 2020 and March 2023.  [...] | Continue reading


@bleepingcomputer.com | 1 year ago