YouTube is currently running what it describes as a “small experiment globally,” warning users to toggle off their ad blockers and avoid being limited to only three video views. […] Source: BleepingComputer | Read More
Category Archives: News
Security analysts have discovered a previously undocumented remote access trojan (RAT) named ‘EarlyRAT,’ used by Andariel, a sub-group of the Lazarus North Korean state-sponsored hacking group. […] Source: BleepingComputer | Read More
MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years. […] Source: BleepingComputer | Read More
The pro-Russia crowdsourced DDoS (distributed denial of service) project, ‘DDoSia,’ has seen a massive 2,400% growth in less than a year, with over ten thousand people helping conduct attacks on Western organizations. […] Source: BleepingComputer | Read More
Proton AG has announced the global availability of Proton Pass, an open-source and free-to-use password manager available as a browser extension or mobile app on Android and iOS.manager. […] Source: BleepingComputer | Read More
Microsoft has addressed a bug causing Windows Search and the Start Menu to become unresponsive and some Windows applications to no longer open. […] Source: BleepingComputer | Read More
Cybersecurity firm Trellix has addressed an incompatibility issue causing Endpoint Security Agent’s Exploit Guard module to block some Microsoft Office and third-party apps from opening after installing June 2023 cumulative updates. […] Source: BleepingComputer | Read More
Microsoft has released Sysmon 15, converting it into a protected process and adding the new ‘FileExecutableDetected’ option to log when executable files are created. […] Source: BleepingComputer | Read More
Data protection vendor Arcserve has addressed a high-severity security flaw in its Unified Data Protection (UDP) backup software that can let attackers bypass authentication and gain admin privileges. […] Source: BleepingComputer | Read More
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. […] Source: BleepingComputer | Read More