Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

bleepingcomputer.com

Latest news and stories from BleepingComputer.com

Get the latest updates from Latest news and stories from BleepingComputer.com directly as they happen.

Follow now 3428 followers

Latest posts

Last updated about 6 hours ago

Google says hackers are abusing Gemini AI for all attacks stages

about 6 hours ago

Google Threat Intelligence Group (GTIG) has published a new report warning about...

Apple fixes zero-day flaw used in 'extremely sophisticated' attacks

about 12 hours ago

Apple has released security updates to fix a zero-day vulnerability that was...

Windows 11 Notepad flaw let files execute silently via Markdown links

about 14 hours ago

Microsoft has fixed a "remote code execution" vulnerability in Windows 11 Notepad...

Microsoft Store Outlook add-in hijacked to steal 4,000 Microsoft accounts

about 16 hours ago

The AgreeTo add-in for Outlook has been hijacked and turned into a...

Crazy ransomware gang abuses employee monitoring tool in attacks

about 18 hours ago

A member of the Crazy ransomware gang is abusing legitimate employee monitoring...

Police arrest seller of JokerOTP MFA passcode capturing tool

about 18 hours ago

The Netherlands Police have arrested a a 21-year-old man from Dordrecht, suspected...

Proactive strategies for cyber resilience with Wazuh

about 20 hours ago

Cyber resilience means anticipating threats, detecting them early, and recovering fast when...

LummaStealer infections surge after CastleLoader malware campaigns

about 20 hours ago

A surge in LummaStealer infections has been observed, driven by social engineering...

Microsoft releases Windows 11 26H1 for select and upcoming CPUs

1 day ago

Microsoft has announced Windows 11 26H1, but it's not for existing PCs...

New Linux botnet SSHStalker uses old-school IRC for C2 comms

1 day ago

A newly documented Linux botnet named SSHStalker is using the IRC (Internet...

North Korean hackers use new macOS malware in crypto-theft attacks

1 day ago

North Korean hackers are running tailored campaigns using AI-generated video and the...

Malicious 7-Zip site distributes installer laced with proxy tool

2 days ago

A fake 7-Zip website is distributing a trojanized installer of the popular...