BleepingComputer

BleepingComputer

Publication
0 followers

Security news and advisories with gov/infra impact.

Mazda Discloses Security Breach Exposing Employee and Partner Data
NewsMar 23, 2026

Mazda Discloses Security Breach Exposing Employee and Partner Data

Mazda Motor Corp disclosed a security incident that exposed personal data of employees and business partners. The breach, discovered in December, involved 692 records and originated from a vulnerability in a warehouse‑management system used for parts sourced from Thailand. No...

By BleepingComputer
Tycoon2FA Phishing Platform Returns After Recent Police Disruption
NewsMar 23, 2026

Tycoon2FA Phishing Platform Returns After Recent Police Disruption

The Tycoon2FA phishing‑as‑a‑service platform, disrupted by Microsoft and Europol in early March, has rebounded to pre‑disruption activity levels within days. Law‑enforcement seized 330 domains that hosted its control panels and phishing pages, but the takedown proved temporary. CrowdStrike observed daily...

By BleepingComputer
TeamPCP Deploys Iran-Targeted Wiper in Kubernetes Attacks
NewsMar 23, 2026

TeamPCP Deploys Iran-Targeted Wiper in Kubernetes Attacks

TeamPCP, the group behind the recent Trivy supply‑chain breach and the CanisterWorm campaign, has rolled out a new destructive payload that targets Kubernetes clusters configured for Iran. The malware deploys a privileged DaemonSet called "Host‑provisioner‑iran" to wipe host files and...

By BleepingComputer
VoidStealer Malware Steals Chrome Master Key via Debugger Trick
NewsMar 22, 2026

VoidStealer Malware Steals Chrome Master Key via Debugger Trick

VoidStealer, a malware‑as‑a‑service platform, now bypasses Chrome’s Application‑Bound Encryption by attaching a debugger and setting hardware breakpoints to capture the v20_master_key in plaintext. The technique extracts the master key directly from memory during browser startup, requiring no privilege escalation or...

By BleepingComputer
Microsoft Azure Monitor Alerts Abused for Callback Phishing Attacks
NewsMar 21, 2026

Microsoft Azure Monitor Alerts Abused for Callback Phishing Attacks

Microsoft Azure Monitor alerts are being exploited to send phishing emails that appear to originate from the legitimate azure‑noreply@microsoft.com address. Attackers create custom alert rules with malicious descriptions, causing the platform to email victims billing‑style warnings and a callback phone...

By BleepingComputer
How CISOs Can Survive the Era of Geopolitical Cyberattacks
NewsMar 20, 2026

How CISOs Can Survive the Era of Geopolitical Cyberattacks

Geopolitical cyber threats are shifting from ransomware to destructive wiper campaigns, exemplified by Iran‑linked Handala’s March 2026 attack on Stryker that crippled operations in 79 countries. The article outlines a five‑step containment playbook for CISOs, emphasizing credential protection, zero‑trust network segmentation,...

By BleepingComputer
Navia Discloses Data Breach Impacting 2.7 Million People
NewsMar 19, 2026

Navia Discloses Data Breach Impacting 2.7 Million People

Navia Benefit Solutions disclosed a breach that affected nearly 2.7 million individuals, exposing personal identifiers such as names, dates of birth, Social Security numbers, and contact details. The unauthorized actors accessed Navia’s systems from December 22, 2025, to January 15, 2026, with the breach discovered...

By BleepingComputer
ConnectWise Patches New Flaw Allowing ScreenConnect Hijacking
NewsMar 18, 2026

ConnectWise Patches New Flaw Allowing ScreenConnect Hijacking

ConnectWise has issued a critical patch for ScreenConnect after uncovering CVE‑2026‑3564, a cryptographic signature verification flaw affecting versions prior to 26.1. The vulnerability enables attackers to extract ASP.NET machine keys and forge authenticated sessions, potentially leading to unauthorized access and...

By BleepingComputer
Ransomware Gang Exploits Cisco Flaw in Zero-Day Attacks Since January
NewsMar 18, 2026

Ransomware Gang Exploits Cisco Flaw in Zero-Day Attacks Since January

The Interlock ransomware gang has been leveraging a maximum‑severity remote code execution flaw (CVE‑2026‑20131) in Cisco Secure Firewall Management Center since late January, giving them a 36‑day zero‑day window before Cisco’s public advisory on March 4, 2026. The exploit permits unauthenticated attackers...

By BleepingComputer
The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms
NewsMar 18, 2026

The Refund Fraud Economy: Exploiting Major Retailers and Payment Platforms

Refund fraud has morphed into a structured underground market where actors sell step‑by‑step tutorials and services for exploiting retailer return and payment dispute processes. Flare researchers analyzed 3,686 posts, uncovering a commercial ecosystem pricing guides between $50 and $300 and...

By BleepingComputer
Nordstrom's Email System Abused to Send Crypto Scams to Customers
NewsMar 18, 2026

Nordstrom's Email System Abused to Send Crypto Scams to Customers

Nordstrom customers received fraudulent emails appearing to come from the retailer’s official address, promoting a St. Patrick’s Day cryptocurrency “double‑your‑deposit” scheme. The messages were sent through Salesforce Marketing Cloud after an Okta‑SSO compromise and promised a 200% return within two hours,...

By BleepingComputer
Apple Pushes First Background Security Improvements Update to Fix WebKit Flaw
NewsMar 18, 2026

Apple Pushes First Background Security Improvements Update to Fix WebKit Flaw

Apple has rolled out its first Background Security Improvements update to address WebKit vulnerability CVE‑2026‑20643 across iPhone, iPad, and Mac devices. The flaw allowed malicious web content to bypass the Same Origin Policy via the Navigation API, and was patched...

By BleepingComputer
Top 5 Things CISOs Need to Do Today to Secure AI Agents
NewsMar 17, 2026

Top 5 Things CISOs Need to Do Today to Secure AI Agents

Agentic AI is reshaping enterprises by giving autonomous software agents the ability to write code, move data, and execute transactions without human oversight. Traditional AI security relies on prompt filtering and output monitoring, which only constrain behavior after access is...

By BleepingComputer
Betterleaks, a New Open-Source Secrets Scanner to Replace Gitleaks
NewsMar 15, 2026

Betterleaks, a New Open-Source Secrets Scanner to Replace Gitleaks

Betterleaks, an open‑source secrets scanner created by the original Gitleaks author, aims to supersede Gitleaks with a faster, more accurate engine. It scans directories, files, and Git repositories using customizable CEL rules and BPE tokenization, achieving 98.6% recall on the...

By BleepingComputer
AppsFlyer Web SDK Hijacked to Spread Crypto-Stealing JavaScript Code
NewsMar 14, 2026

AppsFlyer Web SDK Hijacked to Spread Crypto-Stealing JavaScript Code

This week the AppsFlyer Web SDK was temporarily hijacked, delivering obfuscated JavaScript that intercepted cryptocurrency wallet addresses entered on client sites and swapped them for attacker‑controlled wallets. The malicious payload was served from the official domain between March 9 22:45 UTC and March 11,...

By BleepingComputer
Microsoft: Windows 11 Users Can't Access C: Drive on some Samsung PCs
NewsMar 13, 2026

Microsoft: Windows 11 Users Can't Access C: Drive on some Samsung PCs

Microsoft is investigating a Windows 11 issue on Samsung laptops after the February 2026 security updates, where users lose access to the C:\ drive and cannot launch key applications. The error, “C:\ is not accessible – Access denied,” affects Galaxy Book 4 and...

By BleepingComputer
Poland's Nuclear Research Centre Targeted by Cyberattack
NewsMar 13, 2026

Poland's Nuclear Research Centre Targeted by Cyberattack

Poland’s National Centre for Nuclear Research (NCBJ) detected and blocked a cyberattack on its IT infrastructure before any damage occurred. The institute’s security systems and rapid response prevented compromise of the MARIA research reactor, which continued operating at full power....

By BleepingComputer
From VMware to What’s Next: Protecting Data During Hypervisor Migration
NewsMar 13, 2026

From VMware to What’s Next: Protecting Data During Hypervisor Migration

Broadcom’s 2023 acquisition of VMware has sparked a wave of hypervisor migrations, with Gartner forecasting a 35% workload loss by 2028. Organizations are moving to alternatives such as Hyper‑V, Azure Stack HCI, Nutanix AHV, Proxmox VE, and KVM, but the...

By BleepingComputer
Police Sinkholes 45,000 IP Addresses in Cybercrime Crackdown
NewsMar 13, 2026

Police Sinkholes 45,000 IP Addresses in Cybercrime Crackdown

Operation Synergia III, an Interpol‑led crackdown from July 2025 to January 2026, sinkholed roughly 45,000 malicious IP addresses and seized 212 servers across 72 countries. The operation resulted in 94 arrests, with another 110 suspects under investigation, and uncovered over 33,000 phishing and fraudulent...

By BleepingComputer
Starbucks Discloses Data Breach Affecting Hundreds of Employees
NewsMar 13, 2026

Starbucks Discloses Data Breach Affecting Hundreds of Employees

Starbucks announced a data breach that compromised 889 of its Partner Central employee accounts, exposing names, Social Security numbers, dates of birth, and banking details. The intrusion, traced to credential theft via spoofed login sites, occurred between Jan 19 and Feb 11,...

By BleepingComputer
Google Fixes Two New Chrome Zero-Days Exploited in Attacks
NewsMar 13, 2026

Google Fixes Two New Chrome Zero-Days Exploited in Attacks

Google issued emergency updates on March 13 2026 to fix two high‑severity Chrome zero‑day flaws—CVE‑2026‑3909 in the Skia graphics library and CVE‑2026‑3910 in the V8 JavaScript/WebAssembly engine. Both vulnerabilities were confirmed to be exploited in the wild, prompting rapid patches for the...

By BleepingComputer
Canadian Retail Giant Loblaw Notifies Customers of Data Breach
NewsMar 12, 2026

Canadian Retail Giant Loblaw Notifies Customers of Data Breach

Lobster Companies Limited, Canada’s largest food and pharmacy retailer, disclosed a breach affecting a non‑critical segment of its IT network. Hackers accessed basic customer information, including names, phone numbers and email addresses, but no financial, health, or password data appears...

By BleepingComputer
US Charges Another Ransomware Negotiator Linked to BlackCat Attacks
NewsMar 12, 2026

US Charges Another Ransomware Negotiator Linked to BlackCat Attacks

The U.S. Department of Justice has charged former DigitalMint ransomware negotiator Angelo Martino with conspiracy to interfere with interstate commerce by extortion. Martino allegedly supplied BlackCat (ALPHV) operators with confidential negotiation details and received a 20% cut of ransom payments...

By BleepingComputer
SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites
NewsMar 11, 2026

SQLi Flaw in Elementor Ally Plugin Impacts 250k+ WordPress Sites

A critical SQL injection flaw (CVE‑2026‑2413) was found in Elementor's Ally plugin, affecting all versions up to 4.0.3 and potentially exposing data on more than 250,000 WordPress sites. The vulnerability allows unauthenticated attackers to inject malicious SQL via a URL...

By BleepingComputer
New PhantomRaven NPM Attack Wave Steals Dev Data via 88 Packages
NewsMar 11, 2026

New PhantomRaven NPM Attack Wave Steals Dev Data via 88 Packages

Security researchers have identified a new wave of the PhantomRaven supply‑chain campaign targeting the npm registry. Between November 2025 and February 2026, Endor Labs discovered 88 malicious packages distributed through 50 disposable accounts, many employing slopsquatting and Remote Dynamic Dependencies...

By BleepingComputer
New BeatBanker Android Malware Poses as Starlink App to Hijack Devices
NewsMar 10, 2026

New BeatBanker Android Malware Poses as Starlink App to Hijack Devices

BeatBanker is a new Android malware that masquerades as a Starlink app on counterfeit Google Play Store pages, tricking users into side‑loading the malicious APK. The payload blends a banking trojan, the BTMOB remote‑access trojan, and a Monero XMRig miner,...

By BleepingComputer
New 'Zombie ZIP' Technique Lets Malware Slip Past Security Tools
NewsMar 10, 2026

New 'Zombie ZIP' Technique Lets Malware Slip Past Security Tools

Researchers at Bombadil Systems have identified a new “Zombie ZIP” technique that manipulates ZIP headers to hide malicious payloads from antivirus and endpoint detection and response tools. By marking the compression method as STORED while actually using DEFLATE, scanners read...

By BleepingComputer
Microsoft March 2026 Patch Tuesday Fixes 2 Zero-Days, 79 Flaws
NewsMar 10, 2026

Microsoft March 2026 Patch Tuesday Fixes 2 Zero-Days, 79 Flaws

Microsoft released its March 2026 Patch Tuesday update, delivering security patches for 79 vulnerabilities across Windows, Azure, .NET, and Office products. The bulletin includes two publicly disclosed zero‑day flaws, though Microsoft says neither has been observed in the wild. Among the...

By BleepingComputer
HPE Warns of Critical AOS-CX Flaw Allowing Admin Password Resets
NewsMar 10, 2026

HPE Warns of Critical AOS-CX Flaw Allowing Admin Password Resets

Hewlett Packard Enterprise has released patches for multiple vulnerabilities in Aruba Networking’s AOS‑CX operating system, the most severe being CVE‑2026‑23813, a critical authentication‑bypass that allows unauthenticated actors to reset admin passwords. The flaw resides in the web‑based management interface of...

By BleepingComputer
New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network
NewsMar 10, 2026

New KadNap Botnet Hijacks ASUS Routers to Fuel Cybercrime Proxy Network

A new botnet named KadNap has infected roughly 14,000 ASUS routers and other edge devices since August 2025, forming a peer‑to‑peer network that communicates via a custom Kademlia Distributed Hash Table protocol. The decentralized architecture makes its command‑and‑control infrastructure harder...

By BleepingComputer
The New Turing Test: How Threats Use Geometry to Prove 'Humanness'
NewsMar 10, 2026

The New Turing Test: How Threats Use Geometry to Prove 'Humanness'

Picus Security’s Red Report 2026, which examined over 1.1 million malicious files, reveals a decisive move toward stealthy, evasion‑centric malware. Virtualization and sandbox‑evasion (ATT&CK T1497) now appear in 20 % of samples, ranking as the fourth most‑used technique in 2025. Modern payloads perform system...

By BleepingComputer
CISA: Recently Patched Ivanti EPM Flaw Now Actively Exploited
NewsMar 10, 2026

CISA: Recently Patched Ivanti EPM Flaw Now Actively Exploited

U.S. Cybersecurity and Infrastructure Security Agency (CISA) has classified the high‑severity Ivanti Endpoint Manager vulnerability CVE‑2026‑1603 as actively exploited and placed it in the Known Exploited Vulnerabilities catalog. The flaw, which allows unauthenticated cross‑site scripting to bypass authentication and steal...

By BleepingComputer
FBI Warns of Phishing Attacks Impersonating US City, County Officials
NewsMar 9, 2026

FBI Warns of Phishing Attacks Impersonating US City, County Officials

The FBI has issued a public service announcement warning that cybercriminals are impersonating city and county planning and zoning officials to defraud businesses and individuals applying for land‑use permits. Attackers harvest publicly available permit data, craft emails from non‑government domains,...

By BleepingComputer
EU Court Adviser Says Banks Must Immediately Refund Phishing Victims
NewsMar 8, 2026

EU Court Adviser Says Banks Must Immediately Refund Phishing Victims

Advocate General Athanasios Rantos of the EU Court of Justice issued an opinion that banks must instantly refund victims of unauthorized phishing transactions under the EU Payment Services Directive (PSD2), unless they have reasonable grounds to suspect fraud. The opinion...

By BleepingComputer
Termite Ransomware Breaches Linked to ClickFix CastleRAT Attacks
NewsMar 7, 2026

Termite Ransomware Breaches Linked to ClickFix CastleRAT Attacks

Velvet Tempest, a long‑standing ransomware affiliate, leveraged a ClickFix malvertising lure to breach a U.S. nonprofit’s network of 3,000+ endpoints. The group performed hands‑on AD reconnaissance, harvested Chrome credentials, and staged the DonutLoader and CastleRAT backdoor, but stopped short of...

By BleepingComputer
Microsoft: Hackers Abusing AI at Every Stage of Cyberattacks
NewsMar 7, 2026

Microsoft: Hackers Abusing AI at Every Stage of Cyberattacks

Microsoft’s threat‑intelligence report reveals that cyber‑criminals are increasingly embedding generative AI across the entire attack lifecycle. Threat groups use large language models to draft phishing emails, create fake professional identities, and accelerate malware development. The report highlights specific North Korean...

By BleepingComputer
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
NewsMar 6, 2026

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

EC‑Council unveiled its Enterprise AI Credential Suite, adding four role‑based AI certifications and an updated Certified CISO v4 program. The launch targets the estimated 700,000 U.S. workers needing AI and cybersecurity reskilling and the $5.5 trillion global AI risk exposure identified by...

By BleepingComputer
Microsoft 365 Backup to Add File-Level Restore for Faster Recovery
NewsMar 6, 2026

Microsoft 365 Backup to Add File-Level Restore for Faster Recovery

Microsoft announced that Microsoft 365 Backup will soon support file‑ and folder‑level restores for SharePoint and OneDrive, moving beyond its current site‑wide recovery model. The granular restore lets administrators browse backup points, search, and pull specific items, cutting recovery time dramatically. The...

By BleepingComputer
Ghanain Man Pleads Guilty to Role in $100 Million Fraud Ring
NewsMar 6, 2026

Ghanain Man Pleads Guilty to Role in $100 Million Fraud Ring

A 40‑year‑old Ghanaian national, Derrick Van Yeboah, pleaded guilty to conspiracy to commit wire fraud. He was a senior member of a fraud operation that stole more than $100 million from U.S. victims through romance scams and business‑email‑compromise attacks between 2016...

By BleepingComputer
Chinese State Hackers Target Telcos with New Malware Toolkit
NewsMar 5, 2026

Chinese State Hackers Target Telcos with New Malware Toolkit

Chinese state‑linked APT group UAT‑9244 has been compromising telecom service providers across South America since 2024. The campaign deploys three previously undocumented malware families—TernDoor, a Windows backdoor using DLL side‑loading; PeerTime, a multi‑architecture Linux ELF backdoor that leverages BitTorrent for...

By BleepingComputer
Wikipedia Hit by Self-Propagating JavaScript Worm that Vandalized Pages
NewsMar 5, 2026

Wikipedia Hit by Self-Propagating JavaScript Worm that Vandalized Pages

The Wikimedia Foundation experienced a self‑propagating JavaScript worm that briefly hijacked both user‑level and site‑wide scripts, injecting malicious loaders into MediaWiki:Common.js and dozens of user common.js files. The worm originated from a test script on Russian Wikipedia and was triggered...

By BleepingComputer
FBI Arrests Suspect Linked to $46M Crypto Theft From US Marshals
NewsMar 5, 2026

FBI Arrests Suspect Linked to $46M Crypto Theft From US Marshals

The FBI, in coordination with France's elite Gendarmerie unit, arrested John Daghita on Saint Martin for allegedly stealing more than $46 million in cryptocurrency seized by the U.S. Marshals Service. Daghita, the son of a government‑contractor CEO, is accused of abusing his...

By BleepingComputer
Bitwarden Adds Support for Passkey Login on Windows 11
NewsMar 4, 2026

Bitwarden Adds Support for Passkey Login on Windows 11

Bitwarden announced native support for Windows 11 passkey login, letting users authenticate with credentials stored in their encrypted vault. The feature works across all plans, including the free tier, and uses a QR‑code flow to confirm the passkey on a mobile...

By BleepingComputer
Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers
NewsMar 4, 2026

Mail2Shell Zero-Click Attack Lets Hackers Hijack FreeScout Mail Servers

Researchers at OX Security disclosed a maximum‑severity zero‑click vulnerability (CVE‑2026‑28289) in the open‑source FreeScout help‑desk platform. By embedding a zero‑width space before a malicious filename, attackers can bypass recent upload filters and achieve remote code execution through a single crafted...

By BleepingComputer
Windows 10 KB5075039 Update Fixes Broken Recovery Environment
NewsMar 4, 2026

Windows 10 KB5075039 Update Fixes Broken Recovery Environment

Microsoft released KB5075039, a Windows 10 update that restores the Windows Recovery Environment (WinRE) after the October 2025 KB5068164 patch broke it. WinRE is essential for offline system repair, malware removal, and OS restoration. The fix requires a hidden WinRE partition of...

By BleepingComputer
Cisco Warns of Max Severity Secure FMC Flaws Giving Root Access
NewsMar 4, 2026

Cisco Warns of Max Severity Secure FMC Flaws Giving Root Access

Cisco has issued emergency patches for two maximum‑severity flaws in its Secure Firewall Management Center (FMC) software. The authentication‑bypass vulnerability (CVE‑2026‑20079) lets unauthenticated attackers gain root access, while the remote code execution bug (CVE‑2026‑20131) permits arbitrary Java code execution as...

By BleepingComputer
Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons
NewsMar 4, 2026

Hacker Mass-Mails HungerRush Extortion Emails to Restaurant Patrons

Customers of restaurants using the HungerRush point‑of‑sale platform received extortion emails claiming the attacker possessed millions of customer records, including credit‑card details. The messages were sent through Twilio SendGrid, passing SPF, DKIM and DMARC checks, making them appear authentic from...

By BleepingComputer
Europol-Coordinated Action Disrupts Tycoon2FA Phishing Platform
NewsMar 4, 2026

Europol-Coordinated Action Disrupts Tycoon2FA Phishing Platform

Europol coordinated an international operation that dismantled the Tycoon2FA phishing‑as‑a‑service platform. Law enforcement seized 330 domains supporting the service’s infrastructure across six European countries. The platform, active since August 2023, had been delivering tens of millions of phishing emails each month,...

By BleepingComputer
LexisNexis Confirms Data Breach as Hackers Leak Stolen Files
NewsMar 3, 2026

LexisNexis Confirms Data Breach as Hackers Leak Stolen Files

LexisNexis Legal & Professional confirmed a breach after hackers exploited an unpatched React frontend, using the React2Shell vulnerability to access its AWS environment. The threat actor FulcrumSec leaked over 2 GB of data, including 21,042 customer accounts, 45 attorney password hashes,...

By BleepingComputer