A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany on a hacking forum. […] Source: BleepingComputer | Read More
Category Archives: News
Google has announced new, real-time scanning features for Google Play Protect that make it harder for malicious apps employing polymorphism to evade detection. […] Source: BleepingComputer | Read More
Google says multiple state-backed hacking groups are gaining arbitrary code execution on targets’ systems by exploiting a high-severity vulnerability in WinRAR, a compression software with over 500 million users. […] Source: BleepingComputer | Read More
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August, security researchers announced. […] Source: BleepingComputer | Read More
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August, security researchers announced. […] Source: BleepingComputer | Read More
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August, security researchers announced. […] Source: BleepingComputer | Read More
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August, security researchers announced. […] Source: BleepingComputer | Read More
Twitter, now renamed X, is testing new $1 annual subscriptions to provide unverified accounts access to core features like tweeting and retweeting. […] Source: BleepingComputer | Read More
Microsoft has disabled a bad anti-spam rule flooding Microsoft 365 admins’ inboxes with blind carbon copies (BCC) of outbound emails mistakenly flagged as spam. […] Source: BleepingComputer | Read More
The FBI warns that cybercriminals are using spoofed emails and phone numbers to target plastic surgery offices across the United States for extortion in phishing attacks that spread malware. […] Source: BleepingComputer | Read More