Skip to main content

Security News

Filter by:

Ransomware access brokers use Google ads to breach your network

A threat actor tracked as DEV-0569 uses Google Ads in widespread, ongoing advertising campaigns to distribute malware, steal victims' passwords, and ultimately breach networks for ransomware attacks.
Bleeping Computer 26 Jan 2023 1145 Views

Attackers Crafted Custom Malware for Fortinet Zero-Day

The "BoldMove" backdoor demonstrates a high level of knowledge of FortiOS, according to Mandiant researchers, who said the attacker appears to be based out of China.
Dark Reading 20 Jan 2023 1273 Views

Finally, ransomware victims are refusing to pay up

Near 50% drop in extorted dosh ... or so it says here The amount of money paid to ransomware attackers dropped significantly in 2022, and not because the number of attacks fell.…
The Register 20 Jan 2023 9741 Views

Microsoft pushes KB5021751 to check for outdated Office installs

Microsoft is pushing the KB5021751 update to find out how many of its customers are using an Office version that has reached its end of support or will soon be out of support. [...]
Bleepingcomputer 20 Jan 2023 1168 Views

MailChimp discloses new breach after employees got hacked

Email marketing firm MailChimp suffered another breach after hackers accessed an internal customer support and account administration tool, allowing the threat actors to access the data of 133 customers. [...]
Bleepingcomputer 19 Jan 2023 1228 Views

Ukraine links data-wiping attack on news agency to Russian hackers

The Computer Emergency Response Team of Ukraine (CERT-UA) has linked a destructive malware attack targeting the country's national news agency (Ukrinform) to Sandworm Russian military hackers. [...]
Bleepingcomputer 19 Jan 2023 1264 Views

Hackers can use GitHub Codespaces to host and deliver malware

GitHub Codespaces, a cloud-hosted integrated development environment (IDE), has a port forwarding feature that malicious actors can abuse to host and distribute malware to unaware developers. [...]
Bleepingcomputer 18 Jan 2023 1182 Views

Hackers turn to Google search ads to push info-stealing malware

Hackers are setting up fake websites for popular free and open-source software to promote malicious downloads through advertisements in Google search results. [...]
Bleepingcomputer 18 Jan 2023 1196 Views

Over 4,000 Sophos Firewall devices vulnerable to RCE attacks

Over 4,000 Sophos Firewall devices exposed to Internet access are vulnerable to attacks targeting a critical remote code execution (RCE) vulnerability. [...]
Bleepingcomputer 18 Jan 2023 1181 Views

MSI accidentally breaks Secure Boot for hundreds of motherboards

Over 290 MSI motherboards are reportedly affected by an insecure default UEFI Secure Boot setting settings that allows any operating system image to run regardless of whether it has a wrong or missing signature. [...]
Bleepingcomputer 17 Jan 2023 1245 Views