Bleeping Computer

Syndikovat obsah
BleepingComputer - All Stories
Aktualizace: 13 min 13 sek zpět

Webinar: Spotting cyberattacks before they begin

27 Duben, 2026 - 16:25
On Thursday, April 30 at 2:00 PM ET, BleepingComputer will host a live webinar with threat intelligence company Flare and threat intelligence researcher Tammy Harper, exploring how security teams can identify early warning signs of attacks before they escalate into incidents. [...]
Kategorie: Hacking & Security

Medtronic confirms breach after hackers claim 9 million records theft

27 Duben, 2026 - 15:50
Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in "certain corporate IT systems." [...]
Kategorie: Hacking & Security

Money launderer linked to $230M crypto heist gets 70 months in prison

27 Duben, 2026 - 15:01
​22-year-old Evan Tangeman of Newport Beach, California, was sentenced to 70 months in prison for laundering funds stolen in a massive $230 million cryptocurrency heist. [...]
Kategorie: Hacking & Security

Deepfake Voice Attacks are Outpacing Defenses: What Security Leaders Should Know

27 Duben, 2026 - 15:00
Three seconds of audio is all it takes to clone a voice for fraud. Adaptive Security shows how deepfake calls trick employees into sending real money—and why most defenses don't catch them. [...]
Kategorie: Hacking & Security

Microsoft says Outlook.com outage is causing sign‑in failures

27 Duben, 2026 - 14:03
Microsoft is investigating an ongoing Outlook.com outage that is causing intermittent signing issues and preventing customers from accessing their mailboxes. [...]
Kategorie: Hacking & Security

American utility firm Itron discloses breach of internal IT network

26 Duben, 2026 - 16:22
Itron, Inc. has disclosed, via an 8-K filing with the U.S. Securities and Exchange Commission (SEC), a cybersecurity incident in which an unauthorized third party accessed certain internal systems. [...]
Kategorie: Hacking & Security

Microsoft rolls out revamped Windows Insider Program

25 Duben, 2026 - 19:07
Microsoft says it's rolling out a revamped Windows Insider Program experience as part of the broader plans to address performance and reliability concerns affecting Windows 11. [...]
Kategorie: Hacking & Security

Threat actor uses Microsoft Teams to deploy new “Snow” malware

25 Duben, 2026 - 17:07
A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named 'Snow' which includes a browser extension, a tunneler, and a backdoor. [...]
Kategorie: Hacking & Security

ADT confirms data breach after ShinyHunters leak threat

25 Duben, 2026 - 00:53
Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid. [...]
Kategorie: Hacking & Security

Firestarter malware survives Cisco firewall updates, security patches

24 Duben, 2026 - 22:34
Cybersecurity agencies in the U.S. and U.K. are warning about a custom malware called Firestarter persisting on Cisco Firepower and Secure Firewall devices running Adaptive Security Appliance (ASA) or Firepower Threat Defense (FTD) software. [...]
Kategorie: Hacking & Security

Windows Update gets new controls to reduce forced restarts

24 Duben, 2026 - 22:08
Microsoft is rolling out Windows Update improvements that give users more control over how updates are installed while reducing disruption from frequent or poorly timed restarts. [...]
Kategorie: Hacking & Security

New BlackFile extortion group linked to surge of vishing attacks

24 Duben, 2026 - 20:26
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. [...]
Kategorie: Hacking & Security

Microsoft to roll out Entra passkeys on Windows in late April

24 Duben, 2026 - 20:13
Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected resources from Windows devices starting late April. [...]
Kategorie: Hacking & Security

New ‘Pack2TheRoot’ flaw gives hackers root Linux access

24 Duben, 2026 - 19:28
A new vulnerability dubbed Pack2TheRoot could be exploited in the PackageKit daemon to allow local Linux users to install or remove system packages and gain root permissions. [...]
Kategorie: Hacking & Security

DORA and operational resilience: Credential management as a financial risk control

24 Duben, 2026 - 16:10
Article 9 of DORA makes authentication and access control a legal obligation for EU financial entities. Here is what the regulation requires, and what a breach looks like when those controls are missing. [...]
Kategorie: Hacking & Security

Over 10,000 Zimbra servers vulnerable to ongoing XSS attacks

24 Duben, 2026 - 15:35
Over 10,000 Zimbra Collaboration Suite (ZCS) instances exposed online are vulnerable to ongoing attacks exploiting a cross-site scripting (XSS) security flaw. [...]
Kategorie: Hacking & Security

Microsoft now lets admins uninstall Copilot on enterprise devices

24 Duben, 2026 - 13:38
Microsoft says IT administrators can now uninstall the AI-powered Copilot digital assistant from enterprise devices using a new policy setting, which has become broadly available after the April 2026 Patch Tuesday. [...]
Kategorie: Hacking & Security

Hackers exploit file upload bug in Breeze Cache WordPress plugin

23 Duben, 2026 - 23:33
Hackers are actively exploiting a critical vulnerability in the Breeze Cache plugin for WordPress that allows uploading arbitrary files on the server without authentication. [...]
Kategorie: Hacking & Security

Bitwarden CLI npm package compromised to steal developer credentials

23 Duben, 2026 - 21:21
The Bitwarden CLI was briefly compromised after attackers uploaded a malicious @bitwarden/cli package to npm containing a credential-stealing payload capable of spreading to other projects. [...]
Kategorie: Hacking & Security

Trigona ransomware attacks use custom exfiltration tool to steal data

23 Duben, 2026 - 20:59
Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently. [...]
Kategorie: Hacking & Security