bleepingcomputer.com
bleepingcomputer.com
CRITIC
img-contested
N/A
0 reviews
PUBLIC
img-contested
N/A
1 reviews
RECENT ARTICLES
NO RATING
The Windows XP source code was allegedly leaked online

The Windows XP source code was allegedly leaked online

ByThe source code for Windows XP SP1 and other versions of the operating system was allegedly leaked online today.The leaker claims to have spent the last two months compiling a collection of leaked Microsoft source code. This 43GB collection was then released today as a torrent on the 4chan forum .Included in this torrent is the alleged source code for Windows XP and Windows Server 2003, as well as an assortment of even older versions of the operating system. The contents of the torrent include:The torrent also includes a media folder containing a bizarre collection of conspiracy theory...

bleepingcomputer.com
Lawrence Abrams
19h ago
Worthy
Share
Save
Give Tip
Review
NO RATING
Shopify data breach illustrates the danger of insider threats

Shopify data breach illustrates the danger of insider threats

ByA recent data breach at Shopify that affected almost 200 merchange has been attributed to insiders.The incident did not result from a technical vulnerability, but from two "rogue" support team employees involved in a scheme to procure customer transactional records and sensitive data.Shopify conducted an investigation into the incident and found the breach impacted under 200 Shopify merchants. FBI was also made aware of the findings."We immediately terminated these individuals’ access to our Shopify network and referred the incident to law enforcement. We are currently working with the...

bleepingcomputer.com
Ax Sharma
2d ago
Worthy
Share
Save
Give Tip
Review
NO RATING
Leading U.S. laser developer IPG Photonics hit with ransomware

Leading U.S. laser developer IPG Photonics hit with ransomware

ByIPG Photonics, a leading U.S. developer of fiber lasers for cutting, welding, medical use, and laser weaponry has suffered a ransomware attack that is disrupting their operations.Based out of Oxford, Massachusets, IPG Photonics has locations worldwide where they employ over 4,000 people and have a $1.3 billion revenue in 2019.The company's lasers were used as that was . This system is an experimental defensive weapon against small threats and vehicles.On Monday, BleepingComputer was contacted by a source with knowledge of the attack who told us that a ransomware attack had disrupted its...

bleepingcomputer.com
Lawrence Abrams
Sep 18
Worthy
Share
Save
Give Tip
Review
NO RATING
Privacy-focused search engine DuckDuckGo is growing fast

Privacy-focused search engine DuckDuckGo is growing fast

ByDuckDuckGo, the privacy-focused search engine, announced that August 2020 ended in over 2 billion total searches via its search platform.While Google remains the most popular search engine, DuckDuckGo has gained a great deal of traction in recent months as more and more users have begun to value their privacy on the internet.DuckDuckGo saw over 2 billion searches and 4 million app/extension installations, and the company also said that they have over 65 million active users. DuckDuckGo could shatter its old traffic record if the same growth trend continues.A Record Breaking August at...

bleepingcomputer.com
Mayank Parmar
Sep 16
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft now lets you run Android apps in Windows 10

Microsoft now lets you run Android apps in Windows 10

ByMicrosoft has announced a new feature that allows Windows 10 users running Insider builds to launch their Android apps directly in Windows 10.This feature is only supported on and allows Android to stream apps to your Windows 10 devices.To use this feature, Samsung Galaxy users must first link their device with Windows 10 using the Your Phone app.Once this is done, they can select the 'Link to Windows' button, and a list of the available apps will be displayed in Windows 10, as demonstrated below.Windows 10 users can then launch an Android app and display it in its own window that runs...

bleepingcomputer.com
Lawrence Abrams
Aug 5
Worthy
Share
Save
Give Tip
Review
NO RATING
Intel leak: 20GB of source code, internal docs from alleged breach

Intel leak: 20GB of source code, internal docs from alleged breach

ByClassified and confidential documents from U.S. chipmaker Intel, allegedly resulting from a breach, have been uploaded earlier today to a public file sharing service.The cache of secret information is 20GB large and comes from an unknown source. It was announced as the first part in a series of Intel leaks.According to , a developer and reverse engineer who received the documents from an anonymous hacker, most of the information is supposed to be protected intellectual property. The developer was told that the information was stolen from Intel in a breach this year."They were given to me...

bleepingcomputer.com
Ionut Ilascu
Aug 6
Worthy
Share
Save
Give Tip
Review
NO RATING
Canon hit by Maze Ransomware attack, 10TB data allegedly stolen

Canon hit by Maze Ransomware attack, 10TB data allegedly stolen

By​Canon has suffered a ransomware attack that impacts numerous services, including Canon's email, Microsoft Teams, USA website, and other internal applications.BleepingComputer has been tracking a suspicious outage on Canon's image.canon cloud photo and video storage service resulting in the loss of data for users of their free 10GB storage feature.The  site suffered an outage on July 30th, 2020, and over six days, the site would show status updates until it went back in service yesterday, August 4th.However, the final status update was strange as it mentions that while data was lost,...

bleepingcomputer.com
Lawrence Abrams
Aug 5
Worthy
Share
Save
Give Tip
Review
NO RATING
Windows 10: HOSTS file blocking telemetry is now flagged as a risk

Windows 10: HOSTS file blocking telemetry is now flagged as a risk

ByStarting at the end of July, Microsoft has begun detecting HOSTS files that block Windows 10 telemetry servers as a 'Severe' security risk.The HOSTS file is a text file located at C:\Windows\system32\driver\etc\HOSTS and can only be edited by a program with Administrator privileges.This file is used to resolve hostnames to IP addresses without using the Domain Name System (DNS).This file is commonly used to block a computer from accessing a remote site by assigning host to the 127.0.0.1 or 0.0.0.0 IP address.For example, if you add the following line to the Windows HOSTS file, it will...

bleepingcomputer.com
Lawrence Abrams
Aug 3
Worthy
Share
Save
Give Tip
Review
NO RATING
Vermont Tax Department exposed 3 years worth of tax return info

Vermont Tax Department exposed 3 years worth of tax return info

ByThe Vermont Department of Taxes today disclosed that taxpayers' private information was exposed because of a security issue affecting its online filing site discovered on July 2, 2020.The data breach affected all Vermonters who electronically filed Property Transfer Tax returns using the tax department's site between February 2017 and July 2020."Verification credentials for electronically filed property transfer tax returns available in public municipal records could be used to access previously submitted tax return information," the breach notification ."The credentials could have been...

bleepingcomputer.com
Sergiu Gatlan
Jul 29
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft paid almost $14M in bounties over the last 12 months

Microsoft paid almost $14M in bounties over the last 12 months

ByMicrosoft has awarded $13.7 million to security researchers who have reported vulnerabilities over the last 12 months through 15 bug bounty programs, between July 1st, 2019, and June 30th, 2020.This represents more than three times the amount awarded during the previous year when researchers earned a total of $4.4 million in Microsoft bug bounty awards according to the published on the Microsoft Security Response Center blog."By discovering and reporting vulnerabilities to Microsoft through Coordinated Vulnerability Disclosure (CVD), security researchers have continued to help us secure...

bleepingcomputer.com
Sergiu Gatlan
Aug 4
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

Microsoft Outlook is crashing worldwide with 0xc0000005 errors, how to fix

ByMicrosoft Outlook is immediately crashing worldwide when users start the application, with 0xc0000005 errors displayed in the Windows Event Viewer.These crashes started occurring over the last hour, and reports are flooding in from users all over the world.Users who examined their Application event logs will see an error log stating that the OUTLOOK.EXE program has crashed with an exception code 0xc0000005.BleepingComputer has confirmed the crashes in a test, as can be seen in the image below.The full text of this error is below.Faulting application name: OUTLOOK.EXE, version:...

bleepingcomputer.com
Lawrence Abrams
Jul 15
Worthy
Share
Save
Give Tip
Review
NO RATING
Office 365 now checks docs for known threats before editing

Office 365 now checks docs for known threats before editing

ByMicrosoft today announced the general availability of the Office 365 Safe Documents security feature which expands the protection provided by Protected View by checking untrusted documents for risks and known threats. — launched in  — uses Microsoft Defender Advanced Threat Protection (ATP) to scan documents opened in Protected view and block users from editing them until a verdict is available.Protected View is a read-only Office mode for opening documents deemed as potentially unsafe where most editing features are disabled to protect the users' from threats."Although Protected View...

bleepingcomputer.com
Sergiu Gatlan
Jun 22
Worthy
Share
Save
Give Tip
Review
NO RATING
Malwarebytes causing performance issues in Windows 10 2004

Malwarebytes causing performance issues in Windows 10 2004

BySince the release of Windows 10 2004, users have been reporting performance issues and crashes when Malwarebytes 4.1 is installed.In numerous reports to the Malwarebytes support forums since Windows 10 version 2004, the May 2020 Update, was released, users are reporting many problems with MBAM 4.1 installed.These issues range from random freezes, general slowness, video stuttering, blue screen of death crashes (BSOD), or Windows 10 becoming unresponsive.While not everyone running Windows 10 2004 seems to be affected, there are many requests for help related to this issue in their forums...

bleepingcomputer.com
Lawrence Abrams
Jun 22
Worthy
Share
Save
Give Tip
Review
NO RATING
79 Netgear router models risk full takeover due to unpatched bug

79 Netgear router models risk full takeover due to unpatched bug

By​An unpatched zero-day vulnerability exists in 79 Netgear router models that allow an attacker to take full control over vulnerable devices remotely.Discovered independently by both Adam Nichols of cybersecurity firm Grimm and d4rkn3ss from Vietnam's VNPT ISC (through Zero Day Initiative), the vulnerability lies in the HTTPD daemon used to manage the router.While includes brief information about the vulnerability, Nichols has of the vulnerability, , and .According to the reports, the vulnerable router's HTTPD daemon does not adequately check the length of data supplied by a user, allowing...

bleepingcomputer.com
Lawrence Abrams
Jun 18
Worthy
Share
Save
Give Tip
Review
NO RATING
Hackers use Google Analytics to steal credit cards, bypass CSP

Hackers use Google Analytics to steal credit cards, bypass CSP

ByHackers are using Google's servers and the Google Analytics platform to steal credit card information submitted by customers of online stores.A new method to bypass Content Security Policy (CSP) using the Google Analytics API disclosed last week has already been deployed in ongoing attacks designed to scrape credit card data from several dozen e-commerce sites.This new tactic takes advantage of the fact that e-commerce web sites using Google's web analytics service for tracking visitors are whitelisting Google Analytics domains in their  configuration (a security standard used to block...

bleepingcomputer.com
Sergiu Gatlan
Jun 22
Worthy
Share
Save
Give Tip
Review
NO RATING
Ransomware operators lurk on your network after their attack

Ransomware operators lurk on your network after their attack

ByWhen a company suffers a ransomware attack, many victims feel that the attackers quickly deploy the ransomware and leave so they won't get caught. Unfortunately, the reality is much different as threat actors are not so quick to give up a resource that they worked so hard to control.Instead, ransomware attacks are conducted over time, ranging from a day to even a month, starting with a ransomware operator breaching a network. This breach is through exposed remote desktop services, vulnerabilities in VPN software, or via remote access given by malware such as , , and .Once they gain...

bleepingcomputer.com
Lawrence Abrams
Jun 21
Worthy
Share
Save
Give Tip
Review
NO RATING
Over 500,000 Zoom accounts sold on hacker forums, the dark web

Over 500,000 Zoom accounts sold on hacker forums, the dark web

ByOver 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers.Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each.Cybersecurity...

bleepingcomputer.com
Lawrence Abrams
Apr 13
Worthy
Share
Save
Give Tip
Review
NO RATING
Firefox now tells Mozilla what your default browser is every day

Firefox now tells Mozilla what your default browser is every day

ByFirefox 75 comes with a new telemetry agent that sends information about your operating system and your default browser to Firefox every day. This guide will walk you through disabling this "feature" to protect your privacy.For some time, Firefox has been about how you use the browser, such as the number of web pages you visit, safebrowsing information, the number of open tabs and windows, what add-ons are installed, and more.This telemetry data is kept for 13 months and IP addresses listed in server logs are deleted every 30 days.On my computer, Firefox has collected over 400KB of...

bleepingcomputer.com
Lawrence Abrams
Apr 8
Worthy
Share
Save
Give Tip
Review
NO RATING
The Sandboxie Windows sandbox isolation tool is now open-source!

The Sandboxie Windows sandbox isolation tool is now open-source!

ByCybersecurity firm Sophos announced today that it has open-sourced the Sandboxie Windows sandbox-based isolation utility 15 years after it was released."We are thrilled to give the code to the community," Sophos Director of Product Marketing Seth Geftic ."The Sandboxie tool has been built on many years of highly-skilled developer work and is an example of how to integrate with Windows at a very low level,""The Sandboxie user base represents some of the most passionate, forward-thinking, and knowledgeable members of the security community, and we hope this announcement will spawn a fresh...

bleepingcomputer.com
Sergiu Gatlan
Apr 9
Worthy
Share
Save
Give Tip
Review
NO RATING
Ransomware Gangs to Stop Attacking Health Orgs During Pandemic

Ransomware Gangs to Stop Attacking Health Orgs During Pandemic

BySome Ransomware operators have stated that they will no longer target health and medical organizations during the Coronavirus (COVID-19) pandemic.Last night, BleepingComputer reached out to the operators of the Maze, DoppelPaymer, Ryuk, Sodinokibi/REvil, PwndLocker, and Ako Ransomware infections to ask if they would continue targeting health and medical organizations during the outbreak.DoppelPaymer was the first to respond and stated that they do not normally target hospitals or nursing homes and will continue this approach during the pandemic."We always try to avoid hospitals, nursing...

bleepingcomputer.com
Lawrence Abrams
Mar 18
Worthy
Share
Save
Give Tip
Review
NO RATING
US Democratic Party Symbol Changed to a Rat in Google Search

US Democratic Party Symbol Changed to a Rat in Google Search

ByThe election symbol of the US Democratic Party has been changed to a rat within the Google search knowledge panel that shows when searching for the party's name, instead of the usual donkey-themed one.While no one knows how this happened, the new rat-themed symbol displayed when is now automatically loaded from a made by a now-banned user on a history forum in January.The rat election symbol is currently being shown for all search results that show the Democratic Party symbol.The Republican Party symbol remains unchanged for now. but does display the changed Democratic Party symbol in the...

bleepingcomputer.com
Sergiu Gatlan
Mar 16
Worthy
Share
Save
Give Tip
Review
NO RATING
Research Finds Microsoft Edge Has Privacy-Invading Telemetry

Research Finds Microsoft Edge Has Privacy-Invading Telemetry

ByWhile Microsoft Edge shares the same source code as the popular Chrome browser, it offers better privacy control for users. New research, though, indicates that it may have more privacy-invading telemetry than other browsers.According to Microsoft, telemetry refers to the system data that is uploaded by the Telemetry components or browser's built-in services. Telemetry features aren't new to Microsoft and the company has been using Telemetry data from Windows 10 to identify issues, analyze and fix problems.Professor , Chair of Computer Systems at Trinity College in Ireland, tested six web...

bleepingcomputer.com
Mayank Parmar
Mar 14
Worthy
Share
Save
Give Tip
Review
NO RATING
New LVI Intel CPU Data Theft Vulnerability Requires Hardware Fix

New LVI Intel CPU Data Theft Vulnerability Requires Hardware Fix

ByA novel class of attack techniques against modern Intel processors can allow threat actors to inject malicious data into applications via transient-execution attacks and steal sensitive data according to researchers.The vulnerability dubbed LVI (short for Load Value Injection) and tracked as CVE-2020-0551 was discovered and reported to Intel on April 4, 2019, by researchers at the Worcester Polytechnic Institute, imec-DistriNet/KU Leuven, Graz University of Technology, University of Michigan, University of Adelaide and Data61, in no particular order.Bitdefender researchers also...

bleepingcomputer.com
Sergiu Gatlan
Mar 10
Worthy
Share
Save
Give Tip
Review
NO RATING
Microsoft Leaks Info on Wormable Windows SMBv3 CVE-2020-0796 Flaw

Microsoft Leaks Info on Wormable Windows SMBv3 CVE-2020-0796 Flaw

ByMicrosoft leaked info on a security update for a 'wormable' pre-auth remote code execution vulnerability found in the Server Message Block 3.0 (SMBv3) network communication protocol that reportedly should have been disclosed as part of this month's Patch Tuesday.The vulnerability is due to an error when the SMBv3 handles maliciously crafted compressed data packets and it allows remote, unauthenticated attackers that exploit it to execute arbitrary code within the context of the application.Even though the vulnerability advisory was not published by Microsoft (no explanation for this was...

bleepingcomputer.com
Sergiu Gatlan
Mar 10
Worthy
Share
Save
Give Tip
Review
NO RATING
New Extenbro DNS Changer Trojan Blocks Security Domains

New Extenbro DNS Changer Trojan Blocks Security Domains

ByA newly discovered DNS-changer Trojan dubbed Extenbro has been observed while blocking access to websites of security software vendors to prevent its victims from getting rid of the adware it dumps on their computers."These DNS-changers block access to security-related sites, so the adware victims can’t download and install security software to get rid of the pests," as detailed by Malwarebytes Labs' security researchers who unearthed this new malware.As a side effect, Extenbro will also expose the machines it manages to compromise to all sorts of other threats given that it leaves them...

bleepingcomputer.com
Sergiu Gatlan
Jul 16
Worthy
Share
Save
Give Tip
Review
AUTHORS
Sergiu Gatlan

Sergiu Gatlan

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A
Mayank Parmar

Mayank Parmar

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A
Lawrence Abrams

Lawrence Abrams

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A
Ionut Ilascu

Ionut Ilascu

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A
Ax Sharma

Ax Sharma

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A