Over 90,000 LG Smart TVs may be exposed to remote attacks

Security researchers at Bitdefender have discovered four vulnerabilities impacting multiple versions of WebOS, the operating system used in LG smart TVs. [...] | Continue reading


@bleepingcomputer.com | 27 days ago

Hackers deploy crypto drainers on thousands of WordPress sites

Almost 2,000 hacked WordPress sites now display fake NFT and discount pop-ups to trick visitors into connecting their wallets to crypto drainers that automatically steal funds. [...] | Continue reading


@bleepingcomputer.com | 28 days ago

Notepad++ needs your help in "parasite website" shutdown

The Notepad++ project is seeking the public's help in taking down a copycat website that closely impersonates Notepad++ but is not affiliated with the project. There is some concern that it could pose security threats—for example, if it starts pushing malicious releases or spam s … | Continue reading


@bleepingcomputer.com | 28 days ago

The new features coming in Windows 11 24H2, expected this fall

Windows 11 24H2 is set to arrive on existing devices this fall with several new features, mostly Copilot-related improvements. [...] | Continue reading


@bleepingcomputer.com | 28 days ago

New Windows driver blocks software from changing default web browser

Microsoft is now using a Windows driver to prevent users from changing the Windows 10 and Windows 11 default browser manually or through software. [...] | Continue reading


@bleepingcomputer.com | 29 days ago

New Ivanti RCE flaw may impact 16,000 exposed VPN gateways

Approximately 16,500 Ivanti Connect Secure and Poly Secure gateways exposed on the internet are likely vulnerable to a remote code execution (RCE) flaw the vendor addressed earlier this week. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Microsoft fixes Windows Sysprep issue behind 0x80073cf2 errors

Microsoft has fixed a known issue causing 0x80073cf2 errors when using the System Preparation (Sysprep) tool after installing November Windows 10 updates. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

New Latrodectus malware replaces IcedID in network breaches

A relatively new malware called Latrodectus is believed to be an evolution of the IcedID loader, seen in malicious email campaigns since November 2023. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Visa warns of new JSOutProx malware variant targeting financial orgs

Visa is warning about a spike in detections for a new version of the JsOutProx malware targeting financial institutions and their customers. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

US cancer center data breach exposes info of 827,000 patients

Cancer treatment and research center City of Hope is warning that a data breach exposed the sensitive information of over 820,000 patients. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

The Biggest Takeaways from Recent Malware Attacks

Recent high-profile malware attacks teach us lessons on limiting malware risks at organizations. Learn more from Blink Ops about what these attacks taught us. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

SurveyLama data breach exposes info of 4.4 million users

Data breach alerting service Have I Been Pwned (HIBP) warns that SurveyLama suffered a data breach in February 2024, which exposed the sensitive data of 4.4 million users. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Omni Hotels confirms cyberattack behind ongoing IT outage

Omni Hotels & Resorts has confirmed a cyberattack caused a nationwide IT outage that is still affecting its locations. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Jackson County in state of emergency after ransomware attack

Jackson County, Missouri, is in a state of emergency after a ransomware attack took down some county services on Tuesday. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

US State Department investigates alleged theft of government data

The U.S. Department of State is investigating claims of a cyber incident after a threat actor leaked documents allegedly stolen from a government contractor. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Critical flaw in LayerSlider WordPress plugin impacts 1 million sites

A premium WordPress plugin named LayerSlider, used in over one million sites, is vulnerable to unauthenticated SQL injection, requiring admins to prioritize applying security updates for the plugin. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google fixes one more Chrome zero-day exploited at Pwn2Own

Google has fixed another zero-day vulnerability in the Chrome browser, which was exploited by security researchers during the Pwn2Own hacking contest last month. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

AT&T faces lawsuits over data breach affecting 73 million customers

AT&T is facing multiple class-action lawsuits following the company's admission to a massive data breach that exposed the sensitive data of 73 million current and former customers. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google fixes two Pixel zero-day flaws exploited by forensics firms

Google has fixed two Google Pixel zero-days exploited by forensic firms to unlock phones without a PIN and gain access to the data stored within them. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

6 Prompts You Don't Want Employees Putting in Microsoft Copilot

Microsoft Copilot is a powerful asset for companies, but with it comes an increased risk of data exposure. In this article, Varonis demonstrates prompt-hacking examples that can expose sensitive data. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Microsoft warns Gmail blocks some Outlook email as spam, shares fix

Microsoft has confirmed that some Outlook.com users are experiencing issues with emails being blocked and marked as spam when trying to email Gmail accounts. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Winnti's new UNAPIMON tool hides malware from security software

The Chinese 'Winnti' hacking group was found using a previously undocumented malware called UNAPIMON to let malicous processes run without being detected. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

New Chrome feature aims to stop hackers from using stolen cookies

Google announced a new Chrome security feature that ties cookies to a specific device, blocking hackers from stealing and using them to hijack users' accounts. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google agrees to delete Chrome browsing data of 136 million users

Google has agreed to delete billions of data records collected from 136 million Chrome users in the United States, as part of a lawsuit settlement regarding alleged undisclosed browser data collection while in Incognito mode. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Russia charges suspects behind theft of 160,000 credit cards

Russia's Prosecutor General's Office has announced the indictment of six suspected "hacking group" members for using malware to steal credit card and payment information from foreign online stores. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

New XZ backdoor scanner detects implant in any Linux binary

Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

India rescues 250 citizens enslaved by Cambodian cybercrime gang

The Indian government says it rescued and repatriated 250 citizens who sought jobs in Cambodia, only to be forced into conducting cybercrime once they arrived. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google now blocks spoofed emails for better phishing protection

Google has started automatically blocking emails sent by bulk senders who don't meet stricter spam thresholds and authenticate their messages as required by new guidelines to strengthen defenses against spam and phishing attacks. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

OWASP discloses data breach caused by wiki misconfiguration

The OWASP Foundation has disclosed a data breach after some members' resumes were exposed online due to a misconfiguration of its old Wiki web server. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Yacht retailer MarineMax discloses data breach after cyberattack

MarineMax, self-described as one of the world's largest recreational boat and yacht retailers, says attackers stole employee and customer data after breaching its systems in a March cyberattack. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

FTC: Americans lost $1.1 billion to impersonation scams in 2023

Impersonation scams in the U.S. exceeded $1.1 billion in losses last year, according to statistics collected by the Federal Trade Commission (FTC), a figure that is three times higher than in 2020. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Shopping platform PandaBuy data leak impacts 1.3 million users

Data belonging to more than 1.3 million customers of the PandaBuy online shopping platform has been leaked, allegedly after two threat actors exploited multiple vulnerabilities to breach systems. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

DinodasRAT malware targets Linux servers in espionage campaign

Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known as XDealer) that may have been operating since 2022. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

It's surprisingly difficult for AI to create just a plain white image

Generative AI services like Midjourney and OpenAI's DALL-E can deliver the unimaginable when it comes to stunning artifacts produced from simple text prompts. Sketching complex art imagery may be AI's specialty, yet some of the simplest tasks are evidently what AI struggles with … | Continue reading


@bleepingcomputer.com | 1 month ago

AT&T confirms data for 73 million customers leaked on hacker forum

AT&T has finally confirmed it is impacted by a data breach affecting 73 million current and former customers after initially denying the leaked data originated from them. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Vultur banking malware for Android poses as McAfee Security app

Security researchers found a new version of the Vultur banking trojan for Android that includes more advanced remote control capabilities and an improved evasion mechanism. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Activision: Enable 2FA to secure accounts recently stolen by malware

An infostealer malware campaign has reportedly collected millions of logins from users of various gaming websites, including players that use cheats, pay-to-cheat services. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Red Hat warns of backdoor in XZ tools used by most Linux distros

Today, Red Hat warned users to immediately stop using systems running Fedora development versions because of a backdoor found in the latest XZ data compression tools and libraries. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google Podcasts service shuts down in the US next week

U.S. users have just a few more days to make the transition from Google Podcasts as the company moves forward with the process of discontinuing the service globally. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Decade-old Linux ‘wall’ bug helps make fake SUDO prompts, steal passwords

A vulnerability has been discovered in the 'util-linux' library that could allow unprivileged users to put arbitrary text on other users' terminals using the 'wall' command. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

PyPI suspends new user registration to block malware campaign

The Python Package Index (PyPI) has temporarily suspended user registration and the creation of new projects to deal with an ongoing malware campaign. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

How Pentesting-as-a-Service can Reduce Overall Security Costs

Penetration testing plays a critical role in finding application vulnerabilities before they can be exploited. Learn more from Outpost24 on the costs of Penetration-Testing-as-a-Service vs classic pentest offerings. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

New Darcula phishing service targets iPhone users via iMessage

A new phishing-as-a-service (PhaaS) named 'Darcula' uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users in more than 100 countries. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Google fixes Chrome zero-days exploited at Pwn2Own 2024

Google fixed seven security vulnerabilities in the Chrome web browser on Tuesday, including two zero-days exploited during the Pwn2Own Vancouver 2024 hacking competition. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

CISA tags Microsoft SharePoint RCE bug as actively exploited

CISA warns that attackers are now exploiting a Microsoft SharePoint code injection vulnerability that can be chained with a critical privilege escalation flaw for pre-auth remote code execution attacks. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Windows 10 KB5035941 update released with lock screen widgets

Microsoft has released the optional KB5035941 preview cumulative update for Windows 10 22H2, introducing widgets on the lock screen, Windows Spotlight on the desktop, and 21 other fixes or changes. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Germany warns of 17K vulnerable Microsoft Exchange servers exposed online

The German national cybersecurity authority warned on Tuesday that it found at least 17,000 Microsoft Exchange servers in Germany exposed online and vulnerable to one or more critical security vulnerabilities. [...] | Continue reading


@bleepingcomputer.com | 1 month ago

Hackers exploit Ray framework flaw to breach servers, hijack resources

A new hacking campaign dubbed "ShadowRay" targets an unpatched vulnerability in Ray, a popular open-source AI framework, to hijack computing power and leak sensitive data from thousands of companies. [...] | Continue reading


@bleepingcomputer.com | 1 month ago