DuckDuckGo has launched a new paid-for 3-in-1 subscription service called ‘Privacy Pro,’ which includes a virtual private network (VPN), a personal data removal service, and an identity theft restoration solution. […]
Category Archives: Bleeping Computer
Google has announced a new version of its browser for organizations, Chrome Enterprise Premium, which comes with extended security controls for a monthly fee per user. […]
Google is rolling out a new Workspace feature that requires multiple admins to approve high-risk setting changes to prevent unauthorized or accidental modifications that could reduce security. […]
Researchers have demonstrated the “first native Spectre v2 exploit” for a new speculative execution side-channel flaw that impacts Linux systems running on many modern Intel processors. […]
A threat actor is using a PowerShell script that was likely created with the help of an artificial intelligence system such as OpenAI’s ChatGPT, Google’s Gemini, or Microsoft’s CoPilot. […]
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. […]
Password reuse might seem like a small problem — but it can have far-reaching consequences for an organization’s cybersecurity. Learn more from Specops Software about what IT teams can do to combat the problem. […]
Threat actors are abusing GitHub automation features and malicious Visual Studio projects to push a new variant of the “Keyzetsu” clipboard-hijacking malware and steal cryptocurrency payments. […]
Microsoft has fixed two actively exploited zero-day vulnerabilities during the April 2024 Patch Tuesday, although the company failed to initially tag them as such. […]
Threat actors can exploit a security vulnerability in the Rust standard library to target Windows systems in command injection attacks. […]