Microsoft has addressed an Azure Active Directory (Azure AD) authentication flaw that could allow threat actors to escalate privileges and potentially fully take over the target’s account. […] Source: BleepingComputer | Read More
Category Archives: News
Zyxel is warning its NAS (Network Attached Storage) devices users to update their firmware to fix a critical severity command injection vulnerability. […] Source: BleepingComputer | Read More
Zyxel is warning its NAS (Network Attached Storage) devices users to update their firmware to fix a critical severity command injection vulnerability. […] Source: BleepingComputer | Read More
A cyberespionage and hacking campaign tracked as ‘RedClouds’ uses the custom ‘RDStealer’ malware to automatically steal data from drives shared through Remote Desktop connections. […] Source: BleepingComputer | Read More
More than 101,000 ChatGPT user accounts have been compromised by information stealers over the past year, according to dark web marketplace data. […] Source: BleepingComputer | Read More
Des Moines Public Schools, Iowa’s largest school district, confirmed today that a ransomware attack was behind an incident that forced it to take all networked systems offline on January 9, 2023. […] Source: BleepingComputer | Read More
Malwarebytes released a fix for a known issue breaking Google Chrome on its customers’ systems after installing the Windows 11 22H2 KB5027231 cumulative update released last week. […] Source: BleepingComputer | Read More
ASUS has released new firmware with cumulative security updates that address vulnerabilities in multiple router models, warning customers to immediately update their devices or restrict WAN access until they’re secured. […] Source: BleepingComputer | Read More
A malware campaign is using fake OnlyFans content and adult lures to install a remote access trojan known as ‘DcRAT,’ allowing threat actors to steal data and credentials or deploy ransomware on the infected device. […] Source: BleepingComputer | Read More
Three Android apps on Google Play were used by state-sponsored threat actors to collect intelligence from targeted devices, such as location data and contact lists. […] Source: BleepingComputer | Read More