Source: www.bleepingcomputer.com – Author: Bill Toulas Hackers engaging in cyber espionage have targeted Chinese-speaking semiconductor companies with TSMC-themed lures that infect them with Cobalt Strike beacons....
Author:
Amazon to make MFA mandatory for ‘root’ AWS accounts by mid-2024 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Amazon will require all privileged AWS (Amazon Web Services) accounts to use multi-factor authentication (MFA) for stronger protection against account...
Lyca Mobile investigates customer data leak after cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Lyca Mobile has released a statement about an unexpected disruption on its network caused by a cyberattack that may have...
Hundreds of malicious Python packages found stealing sensitive data – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A malicious campaign that researchers observed growing more complex over the past half year, has been planting on open-source platforms...
Researchers warn of 100,000 industrial control systems exposed online – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas About 100,000 industrial control systems (ICS) were found on the public web, exposed to attackers probing them for vulnerabilities and...
Microsoft: Hackers target Azure cloud VMs via breached SQL servers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Hackers have been observed trying to breach cloud environments through Microsoft SQL Servers vulnerable to SQL injection. Microsoft’s security researchers...
Sony confirms data breach impacting thousands in the U.S. – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Sony Interactive Entertainment (Sony) has notified current and former employees and their family members about a cybersecurity breach that exposed...
Android October security update fixes zero-days exploited in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Google has released the October 2023 security updates for Android, addressing 54 unique vulnerabilities, including two known to be actively...
ShellTorch flaws expose AI servers to code execution attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A set of critical vulnerabilities dubbed ‘ShellTorch’ in the open-source TorchServe AI model-serving tool impact tens of thousands of internet-exposed...
Qualcomm says hackers exploit 3 zero-days in its GPU, DSP drivers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in...
EvilProxy uses indeed.com open redirect for Microsoft 365 phishing – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A recently uncovered phishing campaign is targeting Microsoft 365 accounts of key executives in U.S.-based organizations by abusing open redirects from...
New BunnyLoader threat emerges as a feature-rich malware-as-a-service – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Security researchers discovered a new malware-as-a-service (MaaS) named ‘BunnyLoader’ advertised on multiple hacker forums as a fileless loader that can...
Arm warns of Mali GPU flaws likely exploited in targeted attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Arm in a security advisory today is warning of an actively exploited vulnerability affecting the widely-used Mali GPU drivers. The...
Motel One discloses data breach following ransomware attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Motel One Group has announced that it has been targeted by ransomware actors who managed to steal some customer...
New Marvin attack revives 25-year-old decryption flaw in RSA – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A flaw related to the PKCS #1 v1.5 padding in SSL servers discovered in 1998 and believed to have been...
Cloudflare DDoS protections ironically bypassed using Cloudflare – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Cloudflare’s Firewall and DDoS prevention can be bypassed through a specific attack process that leverages logic flaws in cross-tenant security...
ShinyHunters member pleads guilty to $6 million in data theft damages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Sebastien Raoult, a 22-year-old from France, has pleaded guilty in the U.S. District Court of Seattle to conspiracy to commit...
Discord is investigating cause of ‘You have been blocked’ errors – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Many Discord users attempting to access the popular instant messaging and VoIP social platform today have been met with a...
Lazarus hackers breach aerospace firm with new LightlessCan malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The North Korean ‘Lazarus’ hacking group targeted employees of an aerospace company located in Spain with fake job opportunities to...
Bing Chat responses infiltrated by ads pushing malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Malicious advertisements are now being injected into Microsoft’s AI-powered Bing Chat responses, promoting fake download sites that distribute malware. Bing...
Cisco Catalyst SD-WAN Manager flaw allows remote server access – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Cisco is warning of five new Catalyst SD-WAN Manager products vulnerabilities with the most critical allowing unauthenticated remote access to...
Budworm hackers target telcos and govt orgs with custom malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A Chinese cyber-espionage hacking group tracked as Budworm has been observed targeting a telecommunication firm in the Middle East and...
SSH keys stolen by stream of malicious PyPI and npm packages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A stream of malicious npm and PyPi packages have been found stealing a wide range of sensitive data from software...
US and Japan warn of Chinese hackers backdooring Cisco routers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas US and Japanese law enforcement and cybersecurity agencies warn of the Chinese ‘BlackTech’ hackers breaching network devices to install custom...
Modern GPUs vulnerable to new GPU.zip side-channel attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Researchers from four American universities have developed a new GPU side-channel attack that leverages data compression to leak sensitive visual...
GitHub repos bombarded by info-stealing commits masked as Dependabot – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Hackers are breaching GitHub accounts and inserting malicious code disguised as Dependabot contributions to steal authentication secrets and passwords from...
New ZeroFont phishing tricks Outlook into showing fake AV-scans – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Hackers are utilizing a new trick of using zero-point fonts in emails to make malicious emails appear as safely scanned...
New AtlasCross hackers use American Red Cross as phishing lure – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new APT hacking group named ‘AtlasCross’ targets organizations with phishing lures impersonating the American Red Cross to deliver backdoor...
Hackers actively exploiting Openfire flaw to encrypt servers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Hackers are actively exploiting a high-severity vulnerability in Openfire messaging servers to encrypt servers with ransomware and deploy cryptominers. Openfire...
BORN Ontario child registry data breach affects 3.4 million people – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Better Outcomes Registry & Network (BORN), a healthcare organization funded by the government of Ontario, has announced that it is...





























