Microsoft releases the first official Windows 11 ISOs

Microsoft has finally released the first official ISOs for Windows 11, allowing users to perform clean installs of the new operating system. | Continue reading


@bleepingcomputer.com | 2 years ago

Hackers can bypass Cisco security products in data theft attacks

Cisco said that unauthenticated attackers could bypass TLS inspection filtering tech in multiple products to exfiltrate data from previously compromised servers inside customers' networks. | Continue reading


@bleepingcomputer.com | 2 years ago

You can post LinkedIn jobs as ANY employer — so can attackers

Anyone can create a job listing on the leading recruitment platform LinkedIn on behalf of any employer—no verification needed. Now, that might be nothing new, the feature and lax verification on career websites pave the ways for attackers to post bogus listings for malicious purp … | Continue reading


@bleepingcomputer.com | 2 years ago

CISA shares guidance on how to prevent ransomware data breaches

The US Cybersecurity and Infrastructure Security Agency (CISA) has released guidance to help government and private sector organizations prevent data breaches resulting from ransomware double extortion schemes. | Continue reading


@bleepingcomputer.com | 2 years ago

Liquid cryptocurrency exchange loses $94 million following hack

Japan-based cryptocurrency exchange Liquid has suspended deposits and withdrawals after attackers have compromised its warm wallets. | Continue reading


@bleepingcomputer.com | 2 years ago

Cisco won’t fix zero-day RCE vulnerability in end-of-life VPN routers

In a security advisory published on Wednesday, Cisco said that a critical vulnerability in Universal Plug-and-Play (UPnP) service of multiple small business VPN routers will not be patched because the devices have reached end-of-life. | Continue reading


@bleepingcomputer.com | 2 years ago

US Census Bureau hacked in January 2020 using Citrix exploit

US Census Bureau servers were breached on January 11, 2020, by hackers after exploiting an unpatched Citrix ADC zero-day vulnerability as the US Office of Inspector General (OIG) disclosed in a recent report. | Continue reading


@bleepingcomputer.com | 2 years ago

Bitcoin mixer owner pleads guilty to laundering over $300 million

Larry Dean Harmon, the owner of a dark web cryptocurrency laundering service known as Helix, pleaded guilty today of laundering over $300 million worth of bitcoins between 2014 and 2017. | Continue reading


@bleepingcomputer.com | 2 years ago

New Windows 10 21H2 build comes with improved WiFi security

Microsoft has released Windows 10 21H2 19044.1200 with the awaited new Windows Hello security feature, WPA3 HPE support, and GPU computing in the Windows Subsystem for Linux. | Continue reading


@bleepingcomputer.com | 2 years ago

GitHub urges users to enable 2FA after going passwordless

GitHub is urging its user base to toggle on two-factor authentication (2FA) after deprecating password-based authentication for Git operations. | Continue reading


@bleepingcomputer.com | 2 years ago

Microsoft begins final phase of Internet Explorer's demise

Microsoft's Internet Explorer browser is barely usable after Microsoft officially ends support for the browser in Microsoft 365. | Continue reading


@bleepingcomputer.com | 2 years ago

Japanese insurer Tokio Marine discloses ransomware attack

Tokio Marine Holdings, a multinational insurance holding company in Japan, announced this week that its Singapore branch, Tokio Marine Insurance Singapore (TMiS), suffered a ransomware attack. | Continue reading


@bleepingcomputer.com | 2 years ago

Diavol ransomware sample shows stronger connection to TrickBot gang

A new analysis of a Diavol ransomware sample shows a more clear connection with the gang behind the TrickBot botnet and the evolution of the malware. | Continue reading


@bleepingcomputer.com | 2 years ago

T-Mobile says hackers stole personal info of 7.8 million customers

T-Mobile has confirmed that attackers who recently breached its servers stole files containing the personal information of almost 8 million current customers. | Continue reading


@bleepingcomputer.com | 2 years ago

Govt hackers impersonate HR employees to hit Israeli targets

Hackers associated with the Iranian government have focused attack efforts on IT and communication companies in Israel, likely in an attempt to pivot to their real targets. | Continue reading


@bleepingcomputer.com | 2 years ago

Conti ransomware prioritizes revenue and cyberinsurance data theft

Training material used by Conti ransomware affiliates was leaked online this month, allowing an inside look at how attackers abuse legitimate software seek out cyber insurance policies. | Continue reading


@bleepingcomputer.com | 2 years ago

CISA: BadAlloc impacts critical infrastructure using BlackBerry QNX

CISA today warned that IoT and OT security flaws known as BadAlloc impact BlackBerry's QNX Real Time Operating System (RTOS) used by critical infrastructure organizations. | Continue reading


@bleepingcomputer.com | 2 years ago

Pharmacist faces 120 years in prison for selling vaccination cards on eBay

An Illionois pharmacist arrested today faces 120 years in prison for allegedly selling dozens of authentic COVID-19 vaccination record cards issued by the Center for Disease Control and Prevention (CDC). | Continue reading


@bleepingcomputer.com | 2 years ago

Malware campaign uses clever 'captcha' to bypass browser warning

A malware campaign uses a clever captcha prompt to trick users into bypassing browsers warnings to download the Ursnif (aka Gozi) banking trojan. | Continue reading


@bleepingcomputer.com | 2 years ago

Brazilian government discloses National Treasury ransomware attack

The Brazilian Ministry of Economy has disclosed a ransomware attack that hit some of its computing systems on Friday night, right before the start of the weekend. | Continue reading


@bleepingcomputer.com | 2 years ago

Critical bug impacting millions of IoT devices lets hackers spy on you

Security researchers are sounding the alarm on a critical vulnerability affecting tens of millions of devices worldwide connected via ThroughTek's Kalay IoT cloud platform. | Continue reading


@bleepingcomputer.com | 2 years ago

Fortinet patches bug letting attackers takeover servers remotely

Fortinet has released security updates to address a command injection vulnerability that can let attackers take complete control of servers running vulnerable FortiWeb web application firewall (WAF) installations. | Continue reading


@bleepingcomputer.com | 2 years ago

Chase bank accidentally leaked customer info to other customers

Chase Bank has admitted to the presence of a technical bug on its online banking website and app that allowed accidental leakage of customer banking information to other customers. | Continue reading


@bleepingcomputer.com | 2 years ago

Hive ransomware attacks Memorial Health System, steals patient data

In what appears to be an attack from the Hive ransomware gang, computers of the non-profit Memorial Health System have been encrypted, forcing staff to work with paper charts. | Continue reading


@bleepingcomputer.com | 2 years ago

T-Mobile confirms servers were hacked, investigates data breach

​T-Mobile has confirmed that threat actors hacked their servers in a recent cyber attack but still investigate whether customer data was stolen. | Continue reading


@bleepingcomputer.com | 2 years ago

Malware dev infects own PC and data ends up on intel platform

A malware developer unleashed their creation on their system to try out new features and the data ended up on a cybercrime intelligence platform, exposing a glimpse of the cybercriminal endeavor. | Continue reading


@bleepingcomputer.com | 2 years ago

Education giant Pearson fined $1M for downplaying data breach

The US Securities and Exchange Commission (SEC) announced today that Pearson, a British multinational educational publishing and services company, has settled charges of mishandling the disclosure process for a 2018 data breach discovered in March 2019. | Continue reading


@bleepingcomputer.com | 2 years ago

Secret terrorist watchlist with 2 million records exposed online

A secret terrorist watchlist with 1.9 million records, including "no-fly" records was exposed on the internet. The list was left accessible on an Elasticsearch cluster that had no password on it. | Continue reading


@bleepingcomputer.com | 2 years ago

SIM swap scammer pleads guilty to Instagram account hijacks, crypto theft

Declan Harrington, a Massachusetts man charged two years ago for his alleged involvement in a series of SIM swapping attacks, pleaded guilty to stealing cryptocurrency from multiple victims and hijacking the Instagram account of others.  | Continue reading


@bleepingcomputer.com | 2 years ago

Hackers behind Iranian wiper attacks linked to Syrian breaches

Destructive attacks that targeted Iran's transport ministry and national train system were coordinated by a threat actor dubbed Indra who previously deployed wiper malware on the networks of multiple Syrian organizations. | Continue reading


@bleepingcomputer.com | 2 years ago

Colonial Pipeline reports data breach after May ransomware attack

Colonial Pipeline, the largest fuel pipeline in the United States, is sending notification letters to individuals affected by the data breach resulting from the DarkSide ransomware attack that hit its network in May. | Continue reading


@bleepingcomputer.com | 2 years ago

Hacker claims to steal data of 100 million T-mobile customers

A threat actor claims to have hacked T-Mobile's servers and stolen databases containing the personal data of approximately 100 million customers. | Continue reading


@bleepingcomputer.com | 2 years ago

EasyWSL turns Linux docker images into a Windows 10 WSL distro

If you can't find your favorite Windows Subsystem for Linux distribution available in the Microsoft Store, a new program called EasyWSL can convert almost any Linux Docker image into a WSL distro. | Continue reading


@bleepingcomputer.com | 2 years ago

Ford bug exposed customer and employee records from internal systems

A bug on Ford's website allowed for accessing sensitive systems and obtaining proprietary data, such as customer databases, employee records, internal tickets, etc. The data exposure stemmed from a misconfigured instance of Pega customer engagement system running on Ford's server … | Continue reading


@bleepingcomputer.com | 2 years ago

Ford bug exposed customer and employee records from internal systems

A bug on Ford's website allowed for accessing sensitive systems and obtaining proprietary data, such as customer databases, employee records, internal tickets, etc. The data exposure stemmed from a misconfigured instance of Pega customer engagement system running on Ford's server … | Continue reading


@bleepingcomputer.com | 2 years ago

US brokers warned of ongoing phishing attacks impersonating FINRA

The US Financial Industry Regulatory Authority (FINRA) warns US brokerage firms and brokers of an ongoing phishing campaign impersonating FINRA officials and asking them to hand over sensitive information under the threat of penalties. | Continue reading


@bleepingcomputer.com | 2 years ago

Facebook rolls out end-to-end encryption for Messenger calls

Facebook has announced the roll-out of end-to-end encrypted Messenger voice and video calls five years after making it available in one-on-one text chats. | Continue reading


@bleepingcomputer.com | 2 years ago

The Week in Ransomware - August 13th 2021 - The rise of LockBit

This week we saw an existing operation rise in attacks while existing ransomware operations turn to Windows vulnerabilities to elevate their privileges. | Continue reading


@bleepingcomputer.com | 2 years ago

Windows 365 exposes Microsoft Azure credentials in plaintext

A security researcher has figured out a way to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new Windows 365 Cloud PC service using Mimikatz. | Continue reading


@bleepingcomputer.com | 2 years ago

Emails from Lithuanian Ministry of Foreign Affairs for sale on data-trading forum

The Lithuanian Ministry of Foreign Affairs has declined to comment about the authenticity of email files allegedly stolen from its network and offered for sale on a data-trading forum.Lith | Continue reading


@bleepingcomputer.com | 2 years ago

Windows 365 exposes Microsoft Azure credentials in plain-text

A security researcher has figured out a way to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new Windows 365 Cloud PC service using Mimikatz. | Continue reading


@bleepingcomputer.com | 2 years ago

Microsoft Teams will alert users of incoming spam calls

Microsoft is working on adding a spam call notification feature to the Microsoft 365 Teams collaboration platform. | Continue reading


@bleepingcomputer.com | 2 years ago

SynAck ransomware releases decryption keys after El_Cometa rebrand

The SynAck ransomware gang released the master decryption keys for their operation after rebranding as the new El_Cometa group. | Continue reading


@bleepingcomputer.com | 2 years ago

Bugs in gym management software let hackers change user workout results

Security researchers found vulnerabilities in the Wodify fitness platform that allows an attacker to view and modify user workouts from any of the more than 5,000 gyms that use the solution worldwide. | Continue reading


@bleepingcomputer.com | 2 years ago

Vice Society ransomware joins ongoing PrintNightmare attacks

The Vice Society ransomware gang is now also actively exploiting Windows print spooler PrintNightmare vulnerability for lateral movement through their victims' networks. | Continue reading


@bleepingcomputer.com | 2 years ago

GitHub deprecates account passwords for authenticating Git operations

GitHub has announced today that account passwords will no longer be accepted for authenticating Git operations starting tomorrow. | Continue reading


@bleepingcomputer.com | 2 years ago

Hackers now backdoor Microsoft Exchange using ProxyShell exploits

Threat actors are actively exploiting Microsoft Exchange servers using the ProxyShell vulnerability to install backdoors for later access. | Continue reading


@bleepingcomputer.com | 2 years ago

Microsoft: Evasive Office 365 phishing campaign active since July 2020

Microsoft says that a year-long and highly evasive spear-phishing campaign has targeted Office 365 customers in multiple waves of attacks starting with July 2020. | Continue reading


@bleepingcomputer.com | 2 years ago