Active
Recent
Comments
Search
Login
Login
bleepingcomputer.com: 74 stories from 55 submitters
31
Undocumented "backdoor" found in Bluetooth chip used by a billion devices
2
security
bleepingcomputer.com
via
freddyb
4 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
32 comments
32
11
Russian phishing campaigns exploit Signal's device-linking feature
security
bleepingcomputer.com
via
johnk
21 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
whoAMI attacks give hackers code execution on Amazon EC2 instances
security
bleepingcomputer.com
via
strugee
26 days ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
83
Mozilla fixes Firefox zero-day actively exploited in attacks
2
browsers
security
bleepingcomputer.com
via
m_eiman
5 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
27 comments
27
23
Palo Alto Networks zero-day exploited since March to backdoor firewalls
security
bleepingcomputer.com
via
RiderOfGiraffes
10 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
15
Mozilla fixes two Firefox zero-day bugs exploited at Pwn2Own
browsers
security
bleepingcomputer.com
via
freddyb
11 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
39
New Linux glibc flaw lets attackers get root on major distros
linux
security
bleepingcomputer.com
via
RGBCube
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
17 comments
17
2
Malware abuses Google OAuth endpoint to ‘revive’ cookies, hijack accounts
security
bleepingcomputer.com
via
Thai
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
48
GitHub repos bombarded by info-stealing commits masked as Dependabot
security
bleepingcomputer.com
via
rjzak
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
11 comments
11
18
Okta's source code stolen after GitHub repositories hacked
security
bleepingcomputer.com
via
pointlessone
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
11
Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs
security
bleepingcomputer.com
via
Yogthos
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
24 comments
24
16
LastPass developer systems hacked to steal source code
security
bleepingcomputer.com
via
bhansconnect
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
25
Vodafone plans carrier-level user tracking for targeted ads
privacy
bleepingcomputer.com
via
olliej
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
8
Popular Python and PHP libraries hijacked to steal AWS keys
php
python
security
bleepingcomputer.com
via
clemherreman
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
22 comments
22
7
Kali Linux adds VM-like snapshot feature to bare-metal installs
linux
security
bleepingcomputer.com
via
todb
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Devious phishing method bypasses MFA using remote access software
security
bleepingcomputer.com
via
df
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
78
Dev corrupts NPM libs 'colors' and 'faker' breaking thousands of apps
3
javascript
programming
security
bleepingcomputer.com
via
Helithumper
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
116 comments
116
13
Microsoft starts rolling out redesigned Notepad for Windows 11
windows
bleepingcomputer.com
via
goalieca
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
16 comments
16
32
Razer bug lets you become a Windows 10 admin by plugging in a mouse
2
security
bleepingcomputer.com
via
fernplus
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
19 comments
19
28
Empty npm package '-' has over 700,000 downloads
nodejs
bleepingcomputer.com
via
djsumdog
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
3
REvil ransomware hits 200 companies in MSP supply-chain attack
security
bleepingcomputer.com
via
Ristovski
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Scammers mail fake Ledger devices to steal your cryptocurrency
security
bleepingcomputer.com
via
lattera
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
Brave privacy bug exposes Tor onion URLs to your DNS provider
privacy
bleepingcomputer.com
via
lattera
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
19
Bouncy Castle crypto authentication bypass vulnerability revealed
java
security
bleepingcomputer.com
via
wizardishungry
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
26
Windows XP and Server 2003 compiled from leaked source code
windows
bleepingcomputer.com
via
raymii
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
32 comments
32
Page 2 >>