Bleeping Computer

Syndikovat obsah
BleepingComputer - All Stories
Aktualizace: 28 min 10 sek zpět

Google accidentally exposed details of unfixed Chromium flaw

44 min 33 sek zpět
Google has accidentally leaked details about an unfixed issue in Chromium that keeps JavaScript running in the background even when the browser is closed, allowing remote code execution on the device. [...]
Kategorie: Hacking & Security

Apple blocked over $11 billion in App Store fraud in 6 years

3 hodiny 47 min zpět
Apple revealed that it blocked over $11 billion in fraudulent App Store transactions over the last six years, more than $2.2 billion in potentially fraudulent App Store transactions in 2025 alone. [...]
Kategorie: Hacking & Security

Inside a Crypto Drainer: How to Spot it Before it Empties Your Wallet

4 hodiny 58 min zpět
Modern crypto drainers don't hack wallets. They trick users into approving malicious transactions. Flare explores how the Lucifer DaaS platform scales wallet theft through phishing and automation. [...]
Kategorie: Hacking & Security

Chinese hackers target telcos with new Linux, Windows malware

4 hodiny 58 min zpět
A Chinese cyber-espionage campaign has been targeting telecommunications providers with newly discovered Linux and Windows malware dubbed Showboat and JFMBackdoor, respectively. [...]
Kategorie: Hacking & Security

Max severity Cisco Secure Workload flaw gives Site Admin privileges

4 hodiny 59 min zpět
Cisco has released security updates to address a maximum-severity vulnerability in Secure Workload that allows attackers to gain Site Admin privileges. [...]
Kategorie: Hacking & Security

Police seize “First VPN” service used in ransomware, data theft attacks

5 hodin 48 min zpět
A virtual private network service called 'First VPN,' used in ransomware and data theft attacks, has been taken offline in a joint international law enforcement operation. [...]
Kategorie: Hacking & Security

Flipper One project needs community help to build open Linux platform

7 hodin 58 min zpět
Flipper Devices, the maker of the Flipper Zero pentesting tool, is asking the community to help build Flipper One, an open Linux platform for connected devices. [...]
Kategorie: Hacking & Security

Microsoft warns of new Defender zero-days exploited in attacks

11 hodin 8 min zpět
On Wednesday, Microsoft started rolling out security patches for two Defender vulnerabilities that have been exploited in zero-day attacks. [...]
Kategorie: Hacking & Security

GitHub links repo breach to TanStack npm supply-chain attack

12 hodin 4 min zpět
GitHub says the hackers who breached 3,800 internal repositories gained access via a malicious version of the Nx Console VS Code extension, compromised in last week's TanStack npm supply-chain attack. [...]
Kategorie: Hacking & Security

Ukraine identifies infostealer operator tied to 28,000 stolen accounts

20 Květen, 2026 - 23:36
The Ukrainian cyberpolice, working in conjunction with U.S. law enforcement, has identified an 18-year-old man from Odesa suspected of running an infostealer malware operation targeting users of an online store in California. [...]
Kategorie: Hacking & Security

Hackers bypass SonicWall VPN MFA due to incomplete patching

20 Květen, 2026 - 23:19
Threat actors brute-forced VPN credentials and bypassed multi-factor authentication (MFA) on SonicWall Gen6 SSL-VPN appliances to deploy tools used in ransomware attacks. [...]
Kategorie: Hacking & Security

Grafana breach caused by missed token rotation after TanStack attack

20 Květen, 2026 - 17:46
The Grafana data breach was caused by a single GitHub workflow token that slipped through the rotation process following the TanStack npm supply-chain attack last week. [...]
Kategorie: Hacking & Security

Identity Alone Isn't Enough: Why Device Security Has to Share the Load

20 Květen, 2026 - 16:02
Identity checks alone can't stop attackers using stolen session tokens and compromised devices. Specops Software outlines why Zero Trust strategies increasingly depend on continuous device verification. [...]
Kategorie: Hacking & Security

Drupal critical update to fix bug with high exploitation risk

20 Květen, 2026 - 14:52
Drupal has announced a "core security release" scheduled for later today, warning that threat actors might develop exploits within hours of the update disclosure. [...]
Kategorie: Hacking & Security

Exploit released for new PinTheft Arch Linux root escalation flaw

20 Květen, 2026 - 12:52
PinTheft, a recently patched Linux privilege escalation vulnerability, now has a publicly available proof-of-concept (PoC) exploit that allows local attackers to gain root privileges on Arch Linux systems. [...]
Kategorie: Hacking & Security

GitHub confirms breach of 3,800 repos via malicious VSCode extension

20 Květen, 2026 - 10:14
GitHub has confirmed that roughly 3,800 internal repositories were breached after one of its employees installed a malicious VS Code extension. [...]
Kategorie: Hacking & Security

Microsoft shares mitigation for YellowKey Windows zero-day

20 Květen, 2026 - 09:31
Microsoft has shared mitigations for YellowKey, a recently disclosed Windows BitLocker zero-day vulnerability that grants access to protected drives. [...]
Kategorie: Hacking & Security

GitHub investigates internal repositories breach claimed by TeamPCP

20 Květen, 2026 - 07:08
GitHub is investigating a breach of its internal repositories after the TeamPCP hacker group claimed to have accessed approximately 4,000 repositories containing private code. [...]
Kategorie: Hacking & Security

Max-severity flaw in ChromaDB for AI apps allows server hijacking

20 Květen, 2026 - 00:25
A max-severity vulnerability in the latest Python FastAPI version of the ChromaDB project allows unauthenticated attackers to run arbitrary code on exposed servers. [...]
Kategorie: Hacking & Security

Cybercrime service disrupted for abusing Microsoft platform to sign malware

19 Květen, 2026 - 23:47
Microsoft says it has disrupted a malware-signing-as-a-service (MSaaS) operation that abused the company's Artifact Signing service to generate fraudulent code-signing certificates used by ransomware gangs and other cybercriminals. [...]
Kategorie: Hacking & Security