Off Topic BleepingComputer Feed

Hexui Undetected CSGO Cheats PUBG Accounts
L

Lawrence Abrams

When visiting the eBay.com site, a script will run that performs a local port scan of your computer to detect remote support and remote management applications. [...]

Continue reading...
 
S

Sergiu Gatlan

Right after releasing the Windows 10 May 2020 Update to home customers, Microsoft has already added ten know issues under investigation to the Windows 10 2004 release health dashboard. [...]

Continue reading...
 
L

Lawrence Abrams

Windows 10's Winget package manager is an excellent tool for installing popular applications, but it only works from the command line. To make it easier to find apps and install them, third-party developers have released front-ends for Windows 10's new package manager. [...]

Continue reading...
 

Rake

I'm not your friend
Administrator
Jan 21, 2014
13,031
79,068
2,469
Windows 10's Winget package manager is an excellent tool for installing popular applications, but it only works from the command line. To make it easier to find apps and install them, third-party developers have released front-ends for Windows 10's new package manager. [...]

Continue reading...
this is mad cool
 
  • Like
Reactions: Kleon742
L

Lawrence Abrams

Ransomware gangs are teaming up to extort victims through a shared data leak platform, and the exchange of tactics and intelligence. [...]

Continue reading...
 
S

Sergiu Gatlan

Microsoft acknowledged a new known issue leading to Local Security Authority Subsystem Service (LSASS) critical system process crashes and forced reboots on some Windows 10 devices. [...]

Continue reading...
 
S

Sergiu Gatlan

Russian national Sergey Medvedev, one of the co-founders of Internet-based cybercriminal enterprise Infraud Organization and an admin on the organization's carding forum, today pleaded guilty to RICO conspiracy. [...]

Continue reading...
 
L

Lawrence Abrams

Two days after patches for critical F5 BIG-IP vulnerability were released, security researchers have started publicly posting proof-of-concept (PoC) exploits show how easy it is to exploit these devices. [...]

Continue reading...
 
A

Ax Sharma

The Zoom web conference Client contained a zero-day vulnerability that could have allowed attackers to execute commands on vulnerable systems remotely. [...]

Continue reading...
 
S

Sergiu Gatlan

The UK National Cyber Security Centre (NCSC) today highlighted the increasing risks posed by ransomware attacks, phishing campaigns, and Business Email Compromise (BEC) fraud schemes targeting sports organizations and teams, including Premier League football clubs. [...]

Continue reading...
 
L

Lawrence Abrams

BleepingComputer can confirm that Garmin has received the decryption key to recover their files encrypted in the WastedLocker Ransomware attack. [...]

Continue reading...
 
L

Lawrence Abrams

This week illustrated how pervasive ransomware has become with news of two large and well-known companies getting hit with ransomware attacks, with more surely to come. [...]

Continue reading...
 
M

Mayank Parmar

While the Windows 10's fall feature update focuses on performance enhancements and bug fixes, these are some noticeable new features that we have outlined below. [...]

Continue reading...
 
M

Mayank Parmar

Windows 10's Android app streaming is now available for some devices

Earlier, this streaming feature was only available to the testers in the Release Preview Channel of the Windows Insider program. Microsoft has now confirmed that the feature is being rolled out to all users, including the non-Insiders. [...]

Continue reading...
 
Last edited by a moderator:
S

Sergiu Gatlan

DHS CISA and the FBI today shared more info on how an Iranian state-sponsored hacking group was able to harvest voter registration info from U.S. state websites, including election sites. [...]

Continue reading...
 
A

Ax Sharma

A newly discovered worm and botnet named Gitpaste-12 lives on GitHub and also uses Pastebin to host malicious code. The advanced malware comes equipped with reverse shell and crypto mining capabilities. [...]

Continue reading...
 

[GH]Bot

Moderator
Jun 14, 2016
23
2,082
0
Researchers from Tsinghua University and the University of California have identified a new method that can be used to conduct DNS cache poisoning attacks. The findings reopen a vulnerability that had been discovered by Kaminsky in 2008 and thought to have been resolved. [...]

Continue reading...
 
  • Wow
Reactions: Petko123
Similar threads
Thread starter Title Forum Replies Date
Rake Off Topic Darknet Diaries Podcast Feed Off Topic 83
Rake Off Topic Malicious Life Podcast Feed Off Topic 49

Similar threads

Community Mods