Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

bleepingcomputer@infosec.exchangeB

bleepingcomputer@infosec.exchange

@bleepingcomputer@infosec.exchange
About
Posts
50
Topics
50
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal.

    Link Preview Image
    New macOS stealer campaign uses Script Editor in ClickFix attack

    A new campaign delivering the Atomic Stealer malware to macOS users abuses the Script Editor in a variation of the ClickFix attack that tricked users into executing commands in Terminal.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions.

    Link Preview Image
    Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit

    Exploit code has been released for an unpatched Windows privilege escalation flaw reported privately to Microsoft, allowing attackers to gain SYSTEM or elevated administrator permissions.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building "a functioning operational presence inside the Drift ecosystem."

    Link Preview Image
    Drift $280M crypto theft linked to 6-month in-person operation

    The Drift Protocol says that the $280+ million hack it suffered last week was the result of a long-term, carefully planned operation that included building

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.

    Link Preview Image
    Hackers exploit React2Shell in automated credential theft campaign

    Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed extensions and collect device data.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A new report dubbed "BrowserGate" warns that Microsoft's LinkedIn is using hidden JavaScript scripts on its website to scan visitors' browsers for installed extensions and collect device data.

    Link Preview Image
    LinkedIn secretly scans for 6,000+ Chrome extensions, collects data

    A new report dubbed

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak.

    Link Preview Image
    Die Linke German political party confirms data stolen by Qilin ransomware

    The Qilin ransomware group has claimed responsibility for an attack against Die Linke ('The Left'), forcing an IT systems outage at the political party, and threatening sensitive data leak.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

    Link Preview Image
    Residential proxies evaded IP reputation checks in 78% of 4B sessions

    Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.

    Link Preview Image
    New CrystalRAT malware adds RAT, stealer and prankware features

    A new malware-as-a-service called CrystalRAT is being promoted on Telegram, offering remote access, data theft, keylogging, and clipboard hijacking capabilities.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times.

    Link Preview Image
    'NoVoice' Android malware on Google Play infected 2.3 million devices

    A new Android malware dubbed NoVoice exploited known vulnerabilities to gain root access and has been distributed through more than 50 apps on Google Play Store, with at least 2.3 million downloads.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file.

    Link Preview Image
    Claude AI finds Vim, Emacs RCE bugs that trigger on file open

    Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems.

    Link Preview Image
    Hackers compromise Axios npm package to drop cross-platform malware

    Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver remote access trojans to Linux, Windows, and macOS systems.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix  NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data.

    Link Preview Image
    Critical Citrix NetScaler memory flaw actively exploited in attacks

    Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix  NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.

    Link Preview Image
    Apple adds macOS Terminal warning to block ClickFix attacks

    Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices.

    Link Preview Image
    Hackers exploiting critical F5 BIG-IP flaw in attacks, patch now

    F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on unpatched devices.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation.

    Link Preview Image
    Microsoft pulls KB5079391 Windows update over install issues

    Microsoft has pulled a buggy Windows 11 non-security preview update to investigate a known issue that triggers 0x80073712 errors during installation.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • The European Commission has confirmed a data breach after its Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The European Commission has confirmed a data breach after its Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.

    Link Preview Image
    European Commission confirms data breach after Europa.eu hack

    The European Commission has confirmed a data breach after its Europa.eu web platform was hacked in a cyberattack claimed by the ShinyHunters extortion gang.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware.

    Link Preview Image
    Fake VS Code alerts on GitHub spread malware to developers

    A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading malware.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks.

    Link Preview Image
    GitHub adds AI-powered bug detection to expand security coverage

    GitHub is adopting AI-based scanning for its Code Security tool to expand vulnerability detections beyond the CodeQL static analysis and cover more languages and frameworks.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass authentication and upload new firmware.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass authentication and upload new firmware.

    Link Preview Image
    TP-Link warns users to patch critical router auth bypass flaw

    TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass authentication and upload new firmware.

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized

  • The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack.
    bleepingcomputer@infosec.exchangeB bleepingcomputer@infosec.exchange

    The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular "LiteLLM" Python package on PyPI and claiming to have stolen data from hundreds of thousands of devices during the attack.

    Link Preview Image
    Popular LiteLLM PyPI package backdoored to steal credentials, auth tokens

    The TeamPCP hacking group continues its supply-chain rampage, now compromising the massively popular

    favicon

    BleepingComputer (www.bleepingcomputer.com)

    Uncategorized
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups