Lawrence Abrams
Lawrence Abrams
CRITIC
img-contested
N/A
0 reviews
PUBLIC
img-contested
N/A
0 reviews
RECENT ARTICLES
NO RATING
New Windows 10 update leaks info on upcoming 21H1 feature update

New Windows 10 update leaks info on upcoming 21H1 feature update

ByA Windows 10 20H2 cumulative update released to Insiders on the 'Release' channel leaked that the next feature updated will be 21H1.When Microsoft releases new feature updates, it typically alternates between releasing them as a full-featured update or a small enablement package, which simply turns on dormant features already built into Windows 10.As the and was distributed as an enablement package, the thought was the Windows 10 21H1 would be released as a full feature update.Unfortunately, Microsoft has been very quiet about its upcoming servicing plans for Windows 10, including the...

bleepingcomputer.com
Lawrence Abrams
4d ago
Worthy
Share
Save
Give Tip
Review
NO RATING
Bonobos clothing store confirms breach after hacker leaks 70GB database

Bonobos clothing store confirms breach after hacker leaks 70GB database

ByBonobos men's clothing store has suffered a massive data breach exposing millions of customers' personal information.Bonobos started as an online men's clothing store but later expanded to sixty locations to try on clothes before purchasing them. Walmart bought Bonobos in 2017 for $300 million to sells its clothing on their Jet.com site.Last weekend, a threat actor known as ShinyHunters, who is notorious for hacking online services and selling stolen databases, posted the full Bonobos database to a free hacker forum.This leaked database is a monstrous 70 GB SQL file containing various...

bleepingcomputer.com
Lawrence Abrams
4d ago
Worthy
Share
Save
Give Tip
Review
NO RATING
Windows Finger command abused by phishing to download malware

Windows Finger command abused by phishing to download malware

ByAttackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims' devices.The 'Finger' command is a utility that originated in Linux/Unix operating systems that allows a local user to retrieve a list of users on a remote machine or information about a particular remote user. In addition to Linux, Windows includes a finger.exe command that performs the same functionality.To execute the Finger command, a user would enter finger [user]@[remote_host]. For example, finger bleeping@www.bleepingcomputer.com.In September, we reported that...

bleepingcomputer.com
Lawrence Abrams
Jan 15
Worthy
Share
Save
Give Tip
Review
NO RATING
Verified Twitter accounts hacked in $580k ‘Elon Musk’ crypto scam

Verified Twitter accounts hacked in $580k ‘Elon Musk’ crypto scam

ByThreat actors are hacking verified Twitter accounts in an Elon Musk cryptocurrency giveaway scam that has recently become widely active.There is nothing new about cryptocurrency scams on Twitter, especially ones pretending to be giveaways from Elon Musk. In 2018, scammers raked in $180,000 using a  promoted on Twitter.Over the past week, security researcher MalwareHunterTeam has seen an uptick in verified Twitter accounts hacked in a scam promoting another fake Elon Musk cryptocurrency giveaway.These accounts will reply to tweets, like Elon Musk's below, and promote a scam where Musk is...

bleepingcomputer.com
Lawrence Abrams
Jan 14
Worthy
Share
Save
Give Tip
Review
NO RATING
SolarLeaks site claims to sell data stolen in SolarWinds attacks

SolarLeaks site claims to sell data stolen in SolarWinds attacks

ByA website named 'SolarLeaks' is selling data they claim was stolen from companies confirmed to have been breached in the SolarWinds attack.Last month, it was disclosed that network management company that led to a supply chain attack affecting 18,000 customers.According to a , this attack was "likely" conducted by a Russian state-sponsored hacking group who wanted to  from its victims.Today, a solarleaks[.]net website was launched that claims to be selling the stolen data from Microsoft, Cisco, FireEye, and SolarWinds. All of these companies are known to have been breached during the...

bleepingcomputer.com
Lawrence Abrams
Jan 12
Worthy
Share
Save
Give Tip
Review
NO RATING
Networking giant Ubiquiti alerts customers of potential data breach

Networking giant Ubiquiti alerts customers of potential data breach

ByNetworking device maker Ubiquiti has announced a security incident that may have exposed its customers' data.Ubiquiti is a very popular networking device manufacturer best known for its UniFi line of wired and wireless network products and a cloud management platform.Today, Ubiquiti began emailing customers to change their passwords and enable 2FA after an attacker hacked their systems hosted at a third-party cloud provider."We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider. We have no indication that...

bleepingcomputer.com
Lawrence Abrams
Jan 11
Worthy
Share
Save
Give Tip
Review
NO RATING
Data breach broker selling user records stolen from 26 companies

Data breach broker selling user records stolen from 26 companies

ByA data breach broker is selling the allegedly stolen user records for twenty-six companies on a hacker forum, BleepingComputer has learned.When threat actors and hacking groups breach a company and steal their user databases, they commonly work with data breach brokers who market and sell the data for them. Brokers will then create posts on hacker forums and dark web marketplaces to market the stolen data.Last Friday, a data broker began selling the combined total of 368.8 million stolen user records for twenty-six companies on a hacker forum.Of these twenty-six companies, only eight are...

bleepingcomputer.com
Lawrence Abrams
Dec 31
Worthy
Share
Save
Give Tip
Review
NO RATING
T-Mobile data breach exposed phone numbers, call records

T-Mobile data breach exposed phone numbers, call records

ByT-Mobile has announced a data breach exposing customers' proprietary network information (CPNI), including phone numbers and call records.Starting yesterday, T-Mobile began texting customers that a "security incident" exposed their account's information.According to T-Mobile, its security team recently discovered "malicious, unauthorized access" to their systems. After bringing in a cybersecurity firm to perform an investigation, T-Mobile found that threat actors gained access to the telecommunications information generated by customers, known as CPNI.The information exposed in this...

bleepingcomputer.com
Lawrence Abrams
Dec 30
Worthy
Share
Save
Give Tip
Review
NO RATING
NetGalley discloses data breach after website was hacked

NetGalley discloses data breach after website was hacked

ByThe NetGalley book promotion site has suffered a data breach that allowed threat actors to access a database with members' personal information.NetGalley is a website that allows authors and publishers to promote digital review copies of their books (galleys) to book advocates, influential readers, and industry professionals in the hopes that they will recommend the books to their audience.On Monday, December 21st, NetGalley's website was hacked and defaced. After further investigations, it was determined that the threat actors also accessed a backup for the site's database containing...

bleepingcomputer.com
Lawrence Abrams
Dec 24
Worthy
Share
Save
Give Tip
Review
NO RATING
Physical addresses of 270K Ledger owners leaked on hacker forum

Physical addresses of 270K Ledger owners leaked on hacker forum

ByA threat actor has leaked the stolen email and mailing addresses for Ledger cryptocurrency wallet users on a hacker forum for free.Ledger is a hardware cryptocurrency wallet that is used to store, manage, and sell cryptocurrency. The funds held in these wallets are secured using a 24-word recovery phrase and an optional secret passphrase that only the owner knows.In June 2020,  after a website vulnerability allowed threat actors to access customers' contact details.Today, a threat actor has shared an archive containing two files named 'All Emails (Subscription).txt' and 'Ledger Orders...

bleepingcomputer.com
Lawrence Abrams
Dec 21
Worthy
Share
Save
Give Tip
Review
NO RATING
The SolarWinds cyberattack: The hack, the victims, and what we know

The SolarWinds cyberattack: The hack, the victims, and what we know

BySince the SolarWinds supply chain attack was disclosed last Sunday, there has been a whirlwind of news, technical details, and analysis released about the hack.Because the amount of information that was released in such a short time is definitely overwhelming, we have published this as a roundup of this week's SolarWinds news.The information is distilled into a format that will hopefully explain the attack, who its victims are, and what we know to this point.While we learned of SolarWind's attack on December 13th, the first disclosure of its consequence was made on December 8th when...

bleepingcomputer.com
Lawrence Abrams
Dec 19
Worthy
Share
Save
Give Tip
Review
NO RATING
Google outage caused by critical system running out of storage

Google outage caused by critical system running out of storage

ByThe global Google services outage yesterday was caused by the company's Identity Management System failing after a bug restricted its storage space.This from accessing Gmail, YouTube, Google Drive, Google Maps, Google Calendar, and other Google services.During the outage, users could not send emails via Gmail mobile apps or receive email via POP3 for desktop clients. Also, YouTube visitors were seeing an error message stating, "There was a problem with the server (503) - Tap to retry."According to a tweet and a Google status report, the outage was caused by the company's automated...

bleepingcomputer.com
Lawrence Abrams
Dec 15
Worthy
Share
Save
Give Tip
Review
NO RATING
Ransomware attack causing billing delays for Missouri city

Ransomware attack causing billing delays for Missouri city

ByThe City of Independence, Missouri, suffered a ransomware attack last week that continues to disrupt the city's services.At the beginning of the month, Independence suffered a ransomware attack that forced them to shut down their IT system as they recovered from the attack."The City of Independence recently experienced an event that resulted in technical difficulties and disruption to multiple services. It appears that these disruptions are the result of a ransomware event that was discovered and stopped before it could infect the full City network,"  City of Independence City Manager...

bleepingcomputer.com
Lawrence Abrams
Dec 15
Worthy
Share
Save
Give Tip
Review
NO RATING
Foxconn electronics giant hit by ransomware, $34 million ransom

Foxconn electronics giant hit by ransomware, $34 million ransom

ByFoxconn electronics giant suffered a ransomware attack at a Mexican facility over the Thanksgiving weekend, where attackers stole unencrypted files before encrypting devices.Foxconn is the largest electronics manufacturing company globally, with recorded revenue of $172 billion in 2019 and over 800,000 employees worldwide. Foxconn subsidiaries include Sharp Corporation, Innolux, FIH Mobile, and Belkin.BleepingComputer has been tracking a rumored Foxconn ransomware attack that occurred over the Thanksgiving weekend.Today, the DoppelPaymer ransomware published files belonging to Foxconn NA...

bleepingcomputer.com
Lawrence Abrams
Dec 7
Worthy
Share
Save
Give Tip
Review
NO RATING
Luxottica data breach exposes LensCrafters, EyeMed patient info

Luxottica data breach exposes LensCrafters, EyeMed patient info

ByA Luxottica data breach has exposed the personal and protected health information for patients of LensCrafters, Target Optical, EyeMed, and other eye care practices.Luxottica is the world's largest eyewear company with a portfolio of well-known eyeglass brands, including Ray-Ban, Oakley, Oliver Peoples, Ferrari, Michael Kors, Bulgari, Armani, Prada, Chanel, and Coach.In addition to selling eyeglasses, Luxottica also operates the EyeMed vision benefits company and partners with eye care professionals as part of their LensCrafters, Target Optical, EyeMed, and Pearle Vision retail...

bleepingcomputer.com
Lawrence Abrams
Nov 7
Worthy
Share
Save
Give Tip
Review
NO RATING
GitHub threatens to ban users who bypass YouTube-dl takedown

GitHub threatens to ban users who bypass YouTube-dl takedown

ByGitHub has issued a warning that accounts could be banned if they continue to upload content that was removed due to DMCA takedown notices.On October 23rd, 2020, for the popular video download tool called YouTube-dl after the Recording Industry Association of America, Inc. (RIAA) filed a DMCA infringement notice.This takedown was controversial, as the notice was not issued because YouTube-dl contained copyrighted material or source code, but because it allowed users to download copyrighted content.Since then,  by creating new repositories containing the YouTube-dl source code.Some of...

bleepingcomputer.com
Lawrence Abrams
Nov 2
Worthy
Share
Save
Give Tip
Review
NO RATING
Maze ransomware shuts down operations, denies creating cartel

Maze ransomware shuts down operations, denies creating cartel

By​The infamous Maze ransomware gang announced today that they have officially closed down their ransomware operation and will no longer be leaking new companies' data on their site.Last week,  that Maze had stopped encrypting new victims since the middle of September, cleaned up their data leak site, and was extorting their final victims.Today, Maze released a press release titled "The Project is closed," where they state that they are closed and any other ransomware operation that uses its name is a scam."Maze Team Project is announcing it is officially closed.All the links to out...

bleepingcomputer.com
Lawrence Abrams
Nov 2
Worthy
Share
Save
Give Tip
Review
NO RATING
Steelcase furniture giant hit by Ryuk ransomware attack

Steelcase furniture giant hit by Ryuk ransomware attack

ByOffice furniture giant Steelcase has suffered a ransomware attack that forced them to shut down their network to contain the attack's spread.Steelcase is the largest office furniture manufacturer globally, with 13,000 employees and $3.7 billion in 2020.In an 8-K form filed with the Securities and Exchange Commission (SEC), Steelcase has disclosed that they were the victim of a cyberattack on October 22nd, 2020.On October 22, 2020, Steelcase Inc. (the “Company”) detected a cyberattack on its information technology systems. The Company promptly implemented a series of containment measures...

bleepingcomputer.com
Lawrence Abrams
Oct 27
Worthy
Share
Save
Give Tip
Review
NO RATING
Twitter is warning devs that API keys and tokens may have leaked

Twitter is warning devs that API keys and tokens may have leaked

ByTwitter is emailing developers stating that their API keys, access tokens, and access token secrets may have been exposed in a browser's cache.In an email seen by BleepingComputer, Twitter explains that a developer's browser may have cached the sensitive data when visiting certain pages on developer.twitter.com.Twitter has resolved the issue by not allowing this data to be cached in your browser but warned that other users who used your computer in the past might have been able to access your security tokens and API keys."Prior to the fix, if you used a public or shared computer to view...

bleepingcomputer.com
Lawrence Abrams
Sep 25
Worthy
Share
Save
Give Tip
Review
NO RATING
The Windows XP source code was allegedly leaked online

The Windows XP source code was allegedly leaked online

ByThe source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today.The leaker claims to have spent the last two months compiling a collection of leaked Microsoft source code. This 43GB collection was then released today as a torrent on the 4chan forum .Included in this torrent is the alleged source code for Windows XP and Windows Server 2003, as well as an assortment of even older versions of the operating system. The contents of the torrent include:The torrent also includes a media folder containing a bizarre collection of conspiracy theory...

bleepingcomputer.com
Lawrence Abrams
Sep 25
Worthy
Share
Save
Give Tip
Review
NO RATING
Leading U.S. laser developer IPG Photonics hit with ransomware

Leading U.S. laser developer IPG Photonics hit with ransomware

ByIPG Photonics, a leading U.S. developer of fiber lasers for cutting, welding, medical use, and laser weaponry has suffered a ransomware attack that is disrupting their operations.Based out of Oxford, Massachusets, IPG Photonics has locations worldwide where they employ over 4,000 people and have a $1.3 billion revenue in 2019.The company's lasers were used as that was . This system is an experimental defensive weapon against small threats and vehicles.On Monday, BleepingComputer was contacted by a source with knowledge of the attack who told us that a ransomware attack had disrupted its...

bleepingcomputer.com
Lawrence Abrams
Sep 18
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft now lets you run Android apps in Windows 10

Microsoft now lets you run Android apps in Windows 10

ByMicrosoft has announced a new feature that allows Windows 10 users running Insider builds to launch their Android apps directly in Windows 10.This feature is only supported on and allows Android to stream apps to your Windows 10 devices.To use this feature, Samsung Galaxy users must first link their device with Windows 10 using the Your Phone app.Once this is done, they can select the 'Link to Windows' button, and a list of the available apps will be displayed in Windows 10, as demonstrated below.Windows 10 users can then launch an Android app and display it in its own window that runs...

bleepingcomputer.com
Lawrence Abrams
Aug 5
Worthy
Share
Save
Give Tip
Review
NO RATING
Canon hit by Maze Ransomware attack, 10TB data allegedly stolen

Canon hit by Maze Ransomware attack, 10TB data allegedly stolen

By​Canon has suffered a ransomware attack that impacts numerous services, including Canon's email, Microsoft Teams, USA website, and other internal applications.BleepingComputer has been tracking a suspicious outage on Canon's image.canon cloud photo and video storage service resulting in the loss of data for users of their free 10GB storage feature.The  site suffered an outage on July 30th, 2020, and over six days, the site would show status updates until it went back in service yesterday, August 4th.However, the final status update was strange as it mentions that while data was lost,...

bleepingcomputer.com
Lawrence Abrams
Aug 5
Worthy
Share
Save
Give Tip
Review
NO RATING
Windows 10: HOSTS file blocking telemetry is now flagged as a risk

Windows 10: HOSTS file blocking telemetry is now flagged as a risk

ByStarting at the end of July, Microsoft has begun detecting HOSTS files that block Windows 10 telemetry servers as a 'Severe' security risk.The HOSTS file is a text file located at C:\Windows\system32\driver\etc\HOSTS and can only be edited by a program with Administrator privileges.This file is used to resolve hostnames to IP addresses without using the Domain Name System (DNS).This file is commonly used to block a computer from accessing a remote site by assigning host to the 127.0.0.1 or 0.0.0.0 IP address.For example, if you add the following line to the Windows HOSTS file, it will...

bleepingcomputer.com
Lawrence Abrams
Aug 3
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

ByMicrosoft Outlook is immediately crashing worldwide when users start the application, with 0xc0000005 errors displayed in the Windows Event Viewer.These crashes started occurring over the last hour, and reports are flooding in from users all over the world.Users who examined their Application event logs will see an error log stating that the OUTLOOK.EXE program has crashed with an exception code 0xc0000005.BleepingComputer has confirmed the crashes in a test, as can be seen in the image below.The full text of this error is below.Faulting application name: OUTLOOK.EXE, version:...

bleepingcomputer.com
Lawrence Abrams
Jul 15
Worthy
Share
Save
Give Tip
Review
OUTLETS
bleepingcomputer.com

bleepingcomputer.com

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A