Fixed Intel
Shield

Malware & Threats

Malware analysis, threat intelligence, and emerging cyber threats

Google: Cloud attacks exploit flaws more than weak credentials
BleepingComputer
Malware & Threats

Google: Cloud attacks exploit flaws more than weak credentials

Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain initial access to cloud environments, with the window for attacks shrinking from weeks to just days.

BleepingComputerMar 9, 20266m11
Dutch govt warns of Signal, WhatsApp account hijacking attacks
BleepingComputer
High
Malware & Threats
82/10

Dutch govt warns of Signal, WhatsApp account hijacking attacks

Russian state-sponsored hackers have been linked to an ongoing Signal and WhatsApp phishing campaign targeting government officials, military personnel, and journalists to gain access to sensitive messages.

Russian State-Sponsored Threat ActorsGovernmentDefense
BleepingComputerMar 9, 20265m11
Ericsson US discloses data breach after service provider hack
BleepingComputer
Malware & Threats

Ericsson US discloses data breach after service provider hack

Ericsson Inc., the U.S. subsidiary of Swedish networking and telecommunications giant Ericsson, says attackers have stolen data belonging to an undisclosed number of employees and customers after hacking one of its service providers.

BleepingComputerMar 9, 20263m11
Microsoft Teams will tag third-party bots trying to join meetings
BleepingComputer
Malware & Threats

Microsoft Teams will tag third-party bots trying to join meetings

Microsoft says Teams will soon automatically tag third-party bots in lobbies, allowing organizers to control whether they can join meetings.

BleepingComputerMar 9, 20262m11
ShinyHunters claims ongoing Salesforce Aura data theft attacks
BleepingComputer
Malware & Threats

ShinyHunters claims ongoing Salesforce Aura data theft attacks

Salesforce is warning customers that hackers are targeting websites with misconfigured Experience Cloud platforms that give guest users access to more data than intended. However, the ShinyHunters extortion gang claims to be actively exploiting a new bug to steal data from instances.

BleepingComputerMar 9, 20265m11
FBI warns of phishing attacks impersonating US city, county officials
BleepingComputer
Malware & Threats

FBI warns of phishing attacks impersonating US city, county officials

The Federal Bureau of Investigation (FBI) warns that criminals are impersonating U.S. officials in phishing attacks targeting businesses and individuals who request city and county planning and zoning permits.

BleepingComputerMar 9, 20263m11
Why Password Audits Miss the Accounts Attackers Actually Want
BleepingComputer
Malware & Threats

Why Password Audits Miss the Accounts Attackers Actually Want

Password audits often focus on complexity rules but miss the accounts attackers actually target. Specops Software explains how breached passwords, orphaned users, and service accounts can leave organizations exposed.

BleepingComputerMar 9, 20265m11
Microsoft still working to fix Windows Explorer white flashes
BleepingComputer
Malware & Threats

Microsoft still working to fix Windows Explorer white flashes

Microsoft has confirmed that it's still working to fully address a known issue that causes bright white flashes when opening the File Explorer on some Windows 11 systems.

BleepingComputerMar 9, 20262m11
EU court adviser says banks must immediately refund phishing victims
BleepingComputer
Malware & Threats

EU court adviser says banks must immediately refund phishing victims

Athanasios Rantos, the Advocate General of the Court of Justice of the EU (CJEU), has issued a formal opinion suggesting that banks must immediately refund account holders affected by unauthorized transactions, even when it's their fault.

BleepingComputerMar 8, 20263m11
Hackers abuse .arpa DNS and ipv6 to evade phishing defenses
BleepingComputer
Malware & Threats

Hackers abuse .arpa DNS and ipv6 to evade phishing defenses

Threat actors are abusing the special-use ".arpa" domain and IPv6 reverse DNS in phishing campaigns that more easily evade domain reputation checks and email security gateways.

BleepingComputerMar 8, 20266m11
Termite ransomware breaches linked to ClickFix CastleRAT attacks
BleepingComputer
Malware & Threats

Termite ransomware breaches linked to ClickFix CastleRAT attacks

Ransomware threat actors tracked as Velvet Tempest are using the ClickFix technique and legitimate Windows utilities to deploy the DonutLoader malware and the CastleRAT backdoor.

BleepingComputerMar 7, 20263m11
Microsoft: Hackers abusing AI at every stage of cyberattacks
BleepingComputer
Malware & Threats

Microsoft: Hackers abusing AI at every stage of cyberattacks

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.

BleepingComputerMar 7, 20264m11