The source code for the BlackLotus UEFI bootkit has leaked online, allowing greater insight into a malware that has caused great concern among the enterprise, governments, and the cybersecurity community. […] Source: BleepingComputer | Read More
Category Archives: Bleeping Computer
What’s old is new again, with researchers seeing a threefold increase in malware distributed through USB drives in the first half of 2023 […] Source: BleepingComputer | Read More
A new fileless malware named PyLoose has been targeting cloud workloads to hijack their computational resources for Monero cryptocurrency mining. […] Source: BleepingComputer | Read More
SonicWall warned customers today to urgently patch multiple critical vulnerabilities impacting the company’s Global Management System (GMS) firewall management and Analytics network reporting engine software suites. […] Source: BleepingComputer | Read More
The Russian state-sponsored hacking group ‘APT29’ (aka Nobelium, Cloaked Ursa) has been using unconventional lures like car listings to entice diplomats in Ukraine to click on malicious links that deliver malware. […] Source: BleepingComputer | Read More
Ghostscript, an open-source interpreter for PostScript language and PDF files widely used in Linux, has been found vulnerable to a critical-severity remote code execution flaw. […] Source: BleepingComputer | Read More
Fortinet has disclosed a critical severity flaw impacting FortiOS and FortiProxy, allowing a remote attacker to perform arbitrary code execution on vulnerable devices. […] Source: BleepingComputer | Read More
Data from the first half of the year indicates that ransomware activity is on track to break previous records, seeing a rise in the number of payments, both big and small. […] Source: BleepingComputer | Read More
Microsoft has begun the forced rollout of its Windows 11 22H2 ‘Moment 3’ update, which introduces several new features and improvements to the operating system […] Source: BleepingComputer | Read More
Microsoft disclosed today an unpatched zero-day security bug in multiple Windows and Office products exploited in the wild to gain remote code execution via malicious Office documents. […] Source: BleepingComputer | Read More