Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

bleepingcomputer@infosec.exchangeB

bleepingcomputer@infosec.exchange

@bleepingcomputer@infosec.exchange
About
Posts
21
Topics
21
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds.

    Link Preview Image
    Nigerian man gets eight years in prison for hacking tax firms

    A Nigerian national was sentenced to eight years in prison for hacking multiple tax preparation firms in Massachusetts and filing fraudulent tax returns seeking over $8.1 million in refunds.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.

    Link Preview Image
    Critical infra Honeywell CCTVs vulnerable to auth bypass flaw

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of a critical vulnerability in multiple Honeywell CCTV products that allows unauthorized access to feeds or account hijacking.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.

    Link Preview Image
    AI platforms can be abused for stealthy malware communication

    AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • A Spanish court has granted precautionary measures against NordVPN and ProtonVPN, ordering the two popular VPN providers to block 16 websites that facilitate piracy of football matches.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A Spanish court has granted precautionary measures against NordVPN and ProtonVPN, ordering the two popular VPN providers to block 16 websites that facilitate piracy of football matches.

    Link Preview Image
    Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites

    A Spanish court has granted precautionary measures against NordVPN and ProtonVPN, ordering the two popular VPN providers to block 16 websites that facilitate piracy of football matches.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.

    Link Preview Image
    Flaws in popular VSCode extensions expose developers to attacks

    Vulnerabilities with high to critical severity ratings affecting popular Visual Studio Code (VSCode) extensions collectively downloaded more than 128 million times could be exploited to steal local files and execute code remotely.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • ​Microsoft is working to resolve an ongoing outage affecting Microsoft Teams users, causing delays and preventing some from accessing the service.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    ​Microsoft is working to resolve an ongoing outage affecting Microsoft Teams users, causing delays and preventing some from accessing the service.

    Link Preview Image
    Microsoft Teams outage affects users in United States, Europe

    ​Microsoft is working to resolve an ongoing outage affecting Microsoft Teams users, causing delays and preventing some from accessing the service.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data.

    Link Preview Image
    Poland arrests suspect linked to Phobos ransomware operation

    Polish police have detained a 47-year-old man suspected of ties to the Phobos ransomware group and seized computers and mobile phones containing stolen credentials, credit card numbers, and server access data.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.

    Link Preview Image
    Infostealer malware found stealing OpenClaw secrets for first time

    With the massive adoption of the OpenClaw agentic AI assistant, information-stealing malware has been spotted stealing files associated with the framework that contain API keys, authentication tokens, and other secrets.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.

    Link Preview Image
    Google patches first Chrome zero-day exploited in attacks this year

    Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.

    Link Preview Image
    Snail mail letters target Trezor and Ledger users in crypto-theft attacks

    Threat actors are sending physical letters pretending to be from Trezor and Ledger, makers of cryptocurrency hardware wallets, to trick users into submitting recovery phrases in crypto theft attacks.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries.

    Link Preview Image
    Claude LLM artifacts abused to push Mac infostealers in ClickFix attack

    Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • CISA ordered federal agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    CISA ordered federal agencies on Thursday to secure their systems against a critical Microsoft Configuration Manager vulnerability patched in October 2024 and now exploited in attacks.

    https://www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/

    Uncategorized

  • The Russian government is attempting to block WhatsApp in the country as its crackdown on communication platforms not under its control intensifies.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The Russian government is attempting to block WhatsApp in the country as its crackdown on communication platforms not under its control intensifies.

    https://www.bleepingcomputer.com/news/security/russia-tries-to-block-whatsapp-telegram-in-communication-blockade/

    Uncategorized

  • Today, at Wild West Hackin' Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Today, at Wild West Hackin' Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK shortcut files that allow attackers to deploy malicious payloads.

    https://www.bleepingcomputer.com/news/microsoft/microsoft-new-windows-lnk-spoofing-issues-arent-vulnerabilities/

    Uncategorized

  • Romania's national oil pipeline operator, Conpet S.A., confirmed that the Qilin ransomware gang stole company data in an attack last week.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Romania's national oil pipeline operator, Conpet S.A., confirmed that the Qilin ransomware gang stole company data in an attack last week.

    https://www.bleepingcomputer.com/news/security/romanias-oil-pipeline-operator-conpet-confirms-data-stolen-in-attack/

    Uncategorized

  • A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A set of 30 malicious Chrome extensions that have been installed by more than 300,000 users are masquerading as AI assistants to steal credentials, email content, and browsing information.

    https://www.bleepingcomputer.com/news/security/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/

    Uncategorized

  • The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The AgreeTo add-in for Outlook has been hijacked and turned into a phishing kit that stole more than 4,000 Microsoft account credentials.

    https://www.bleepingcomputer.com/news/security/microsoft-store-outlook-add-in-hijacked-to-steal-4-000-microsoft-accounts/

    Uncategorized

  • A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node.

    https://www.bleepingcomputer.com/news/security/malicious-7-zip-site-distributes-installer-laced-with-proxy-tool/

    Uncategorized

  • Microsoft has released the KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Microsoft has released the KB5075912 extended security update to fix February 2026 Patch Tuesday vulnerabilities, including six zero-days, and continue rolling out replacements for expiring Secure Boot certificates.

    https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-10-kb5075912-extended-security-update/

    Uncategorized

  • Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Microsoft has begun rolling out updated Secure Boot certificates through monthly Windows updates to replace the original 2011 certificates that will expire in late June 2026.

    https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-new-secure-boot-certificates-before-june-expiration/

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups