New phishing attacks abuse Microsoft Teams group chat requests to push malicious attachments that install DarkGate malware payloads on victims’ systems. […] Source: BleepingComputer | Read More
Category Archives: Bleeping Computer
SMBs are attractive targets for cybercriminals as they typically have fewer resources like IT support, and lack robust security procedures, like employee cybersecurity training. Learn more from Specops Software on how SMBs can protect themselves from cyberattacks. […] Source: BleepingComputer | Read More
New York Attorney General Letitia James sued Citibank over its failure to defend customers against hacks and scams and refusing to reimburse victims after allowing fraudsters to steal millions from their accounts. […] Source: BleepingComputer | Read More
Keenan & Associates is sending notices of a data breach to 1.5 million customers, warning that hackers accessed their personal information in a recent cyberattack. […] Source: BleepingComputer | Read More
Researchers found roughly 45,000 Jenkins instances exposed online that are vulnerable to CVE-2023-23897, a critical remote code execution (RCE) flaw for which multiple public proof-of-concept (PoC) exploits are in circulation. […] Source: BleepingComputer | Read More
Energy management and automation giant Schneider Electric suffered a Cactus ransomware attack leading to the theft of corporate data, according to people familiar with the matter. […] Source: BleepingComputer | Read More
Microsoft is investigating an issue that prevents Outlook and other email clients from connecting when using an Outlook.com account. […] Source: BleepingComputer | Read More
Today, the FBI warned about courier services being used to collect money and valuables from victims of tech support and government impersonation scams. […] Source: BleepingComputer | Read More
Three former Department of Homeland Security (DHS) employees were sentenced to prison for stealing proprietary U.S. government software and databases containing the personal data of 200,000 federal employees. […] Source: BleepingComputer | Read More
Multiple proof-of-concept (PoC) exploits for a critical Jenkins vulnerability allowing unauthenticated attackers to read arbitrary files have been made publicly available, with some researchers reporting attackers actively exploiting the flaws in attacks. […] Source: BleepingComputer | Read More