www.bleepingcomputer.com Open in urlscan Pro
104.20.184.56  Public Scan

Submitted URL: http://www.bleepingcomputer.com/
Effective URL: https://www.bleepingcomputer.com/
Submission: On November 18 via api from SG — Scanned from SG

Form analysis 3 forms found in the DOM

https://www.bleepingcomputer.com/search/

<form title="Search site" action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" aria-label="Search Site" placeholder="Search Site">
</form>

https://www.bleepingcomputer.com/search/

<form action="https://www.bleepingcomputer.com/search/">
  <input type="hidden" name="cx" value="partner-pub-0920899300397823:3529943228">
  <input type="hidden" name="cof" value="FORID:10">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="search" name="q" aria-label="Search Site" placeholder="Search Site">
</form>

POST https://www.bleepingcomputer.com/forums/index.php?app=core&module=global&section=login&do=process&return=https://www.bleepingcomputer.com/

<form action="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;do=process&amp;return=https://www.bleepingcomputer.com/" method="post">
  <div class="bc_form_feild">
    <label for="ips_username">Username</label>
    <input aria-label="Enter login name" title="Enter login name" type="text" id="ips_username" name="ips_username" spellcheck="false" autocomplete="username">
  </div>
  <div class="bc_form_feild">
    <label for="ips_password">Password</label>
    <input aria-label="Enter login password" title="Enter login passwod" type="password" id="ips_password" name="ips_password" spellcheck="false" autocomplete="current-password">
  </div>
  <div class="bc_form_feild">
    <div class="bc_remember">
      <input id="remember" type="checkbox" name="rememberMe" value="1" checked="checked">
      <label for="remember">Remember Me</label>
    </div>
    <div class="bc_anon">
      <input id="anonymous" type="checkbox" name="anonymous" value="1">
      <label for="anonymous">Sign in anonymously</label>
    </div>
  </div>
  <div class="bc_btn_wrap">
    <input type="hidden" name="auth_key" value="880ea6a14ea49e853634fbdc5015a024">
    <input type="submit" aria-label="Login to site" title="Login" value="Login" class="bc_sub_btn">
    <a aria-label="Sign in with Twitter" href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=login&amp;serviceClick=twitter&amp;return=https://www.bleepingcomputer.com/" class="bc_twitter_btn"><img src="https://www.bleepstatic.com/images/site/login/twitter.png" width="28" height="24" alt="Sign in with Twitter button"> Sign in with Twitter</a>
    <hr>
    <p>Not a member yet? <a aria-label="Register account" title="Register account" href="https://www.bleepingcomputer.com/forums/index.php?app=core&amp;module=global&amp;section=register">Register Now</a></p>
  </div>
</form>

Text Content

 * 
 * 
 * 
 * 



 * 
 * 
 * 
 * 



 * News
    * Featured
    * Latest
   
    * Microsoft pulls Exchange security updates over mail delivery issues
   
    * GitHub projects targeted with malicious commits to frame researcher
   
    * T-Mobile confirms it was hacked in recent wave of telecom breaches
   
    * NSO Group used another WhatsApp zero-day after being sued, court docs say
   
    * Phishing emails increasingly use SVG attachments to evade detection
   
    * Security plugin flaw in millions of WordPress sites gives admin access
   
    * Get $89 off Microsoft Office 2024 in this deal
   
    * Fake AI video generators infect Windows, macOS with infostealers

 * Tutorials
    * Latest
    * Popular
   
    * How to access the Dark Web using the Tor Browser
   
    * How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11
   
    * How to use the Windows Registry Editor
   
    * How to backup and restore the Windows Registry
   
    * How to start Windows in Safe Mode
   
    * How to remove a Trojan, Virus, Worm, or other Malware
   
    * How to show hidden files in Windows 7
   
    * How to see hidden files in Windows

 * Virus Removal Guides
    * Latest
    * Most Viewed
    * Ransomware
   
    * Remove the Theonlinesearch.com Search Redirect
   
    * Remove the Smartwebfinder.com Search Redirect
   
    * How to remove the PBlock+ adware browser extension
   
    * Remove the Toksearches.xyz Search Redirect
   
    * Remove Security Tool and SecurityTool (Uninstall Guide)
   
    * How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
   
    * How to remove Antivirus 2009 (Uninstall Instructions)
   
    * How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using
      TDSSKiller
   
    * Locky Ransomware Information, Help Guide, and FAQ
   
    * CryptoLocker Ransomware Information Guide and FAQ
   
    * CryptorBit and HowDecrypt Information Guide and FAQ
   
    * CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ

 * Downloads
    * Latest
    * Most Downloaded
   
    * Qualys BrowserCheck
   
    * STOPDecrypter
   
    * AuroraDecrypter
   
    * FilesLockerDecrypter
   
    * AdwCleaner
   
    * ComboFix
   
    * RKill
   
    * Junkware Removal Tool

 * Deals
    * Categories
   
    * eLearning
   
    * IT Certification Courses
   
    * Gear + Gadgets
   
    * Security

 * VPNs
    * Popular
   
    * Best VPNs
   
    * How to change IP address
   
    * Access the dark web safely
   
    * Best VPN for YouTube

 * Forums
 * More
   * Startup Database
   * Uninstall Database
   * Glossary
   * Chat on Discord
   * Send us a Tip!
   * Welcome Guide

MICROSOFT PULLS EXCHANGE SECURITY UPDATES OVER MAIL DELIVERY ISSUES

GITHUB PROJECTS TARGETED WITH MALICIOUS COMMITS TO FRAME RESEARCHER

T-MOBILE CONFIRMS IT WAS HACKED IN RECENT WAVE OF TELECOM BREACHES

NSO GROUP USED ANOTHER WHATSAPP ZERO-DAY AFTER BEING SUED, COURT DOCS SAY

MICROSOFT PULLS EXCHANGE SECURITY UPDATES OVER MAIL DELIVERY ISSUES

GITHUB PROJECTS TARGETED WITH MALICIOUS COMMITS TO FRAME RESEARCHER

T-MOBILE CONFIRMS IT WAS HACKED IN RECENT WAVE OF TELECOM BREACHES

NSO GROUP USED ANOTHER WHATSAPP ZERO-DAY AFTER BEING SUED, COURT DOCS SAY



Latest Articles
 * Security
   
   PHISHING EMAILS INCREASINGLY USE SVG ATTACHMENTS TO EVADE DETECTION
   
   Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to
   display phishing forms or deploy malware while evading detection.
   
    * Lawrence Abrams
    * November 17, 2024
    * 11:25 AM
    * 0

 * Security
   
   SECURITY PLUGIN FLAW IN MILLIONS OF WORDPRESS SITES GIVES ADMIN ACCESS
   
   A critical authentication bypass vulnerability has been discovered impacting
   the WordPress plugin 'Really Simple Security' (formerly 'Really Simple SSL'),
   including both free and Pro versions.
   
    * Bill Toulas
    * November 17, 2024
    * 10:19 AM
    * 0

 * SPONSORED CONTENT
   FREE SHADOW SAAS INVENTORY + SECURITY INSIGHTS
   
   Discover all SaaS accounts ever created by anyone in your org, in minutes,
   along with insights on security risks and spend. Save time, money and effort
   by curbing SaaS sprawl and automating tasks like offboarding and user access
   reviews. Free trial.
   
    * Sponsored by Nudge Security

 * Deals
   
   GET $89 OFF MICROSOFT OFFICE 2024 IN THIS DEAL
   
   Grab the 2024 edition of Microsoft Office for your Mac or PC while it's
   available for $159.97. Inventory is limited, and this offer expires today,
   November 17, at 11:59 PM Pacific.
   
    * BleepingComputer Deals
    * November 17, 2024
    * 08:09 AM
    * 0

 * Security
   
   FAKE AI VIDEO GENERATORS INFECT WINDOWS, MACOS WITH INFOSTEALERS
   
   Fake AI image and video generators infect Windows and macOS with the Lumma
   Stealer and AMOS information-stealing malware, used to steal credentials and
   cryptocurrency wallets from infected devices.
   
    * Lawrence Abrams
    * November 16, 2024
    * 03:14 PM
    * 2

 * Security
   
   T-MOBILE CONFIRMS IT WAS HACKED IN RECENT WAVE OF TELECOM BREACHES
   
   T-Mobile confirms it was hacked in the wave of recently reported telecom
   breaches conducted by Chinese threat actors to gain access to private
   communications, call records, and law enforcement information requests.
   
    * Lawrence Abrams
    * November 16, 2024
    * 12:47 PM
    * 1

 * Security
   
   GITHUB PROJECTS TARGETED WITH MALICIOUS COMMITS TO FRAME RESEARCHER
   
   GitHub projects have been targeted with malicious commits and pull requests,
   in an attempt to inject backdoors into these projects. Most recently, the
   GitHub repository of Exo Labs, an AI and machine learning startup, was
   targeted in the attack, which has left many wondering about the attacker's
   true intentions.
   
    * Ax Sharma
    * November 16, 2024
    * 10:30 AM
    * 1

 * Deals
   
   ADVANCE YOUR CYBERSECURITY KNOWLEDGE FOR JUST $29.97 IN THIS COURSE DEAL
   
   The CISSP (Certified Information Systems Security Professional) certification
   is one of the most respected certifications in the industry, and for a
   limited time, you can deep dive into the world of cybersecurity for only
   $29.97—no coupon needed.
   
    * BleepingComputer Deals
    * November 16, 2024
    * 08:11 AM
    * 0

 * Security
   
   NSO GROUP USED ANOTHER WHATSAPP ZERO-DAY AFTER BEING SUED, COURT DOCS SAY
   
   Israeli surveillance firm NSO Group reportedly used multiple zero-day
   exploits, including an unknown one named "Erised," that leveraged WhatsApp
   vulnerabilities to deploy Pegasus spyware in zero-click attacks, even after
   getting sued.
   
    * Sergiu Gatlan
    * November 15, 2024
    * 05:04 PM
    * 5

 * Security
   
   BOTNET EXPLOITS GEOVISION ZERO-DAY TO INSTALL MIRAI MALWARE
   
   A malware botnet is exploiting a zero-day vulnerability in end-of-life
   GeoVision devices to compromise and recruit them for likely DDoS or
   cryptomining attacks.
   
    * Bill Toulas
    * November 15, 2024
    * 02:39 PM
    * 0

 * Security
   
   FTC REPORTS 50% DROP IN UNWANTED CALL COMPLAINTS SINCE 2021
   
   On Friday, the U.S. Federal Trade Commission (FTC) reported that the number
   of consumer complaints about unwanted telemarketing phone calls has dropped
   over 50% since 2021, continuing a trend that started three years ago.
   
    * Sergiu Gatlan
    * November 15, 2024
    * 01:50 PM
    * 4

 * Security, CryptoCurrency, Legal
   
   BITFINEX HACKER GETS 5 YEARS IN PRISON FOR 120,000 BITCOIN HEIST
   
   A hacker responsible for stealing 119,754 Bitcoin in a 2016 hack on the
   Bitfinex cryptocurrency exchange was sentenced to five years in prison by
   U.S. authorities.
   
    * Bill Toulas
    * November 15, 2024
    * 11:36 AM
    * 1

 * Microsoft, Security
   
   MICROSOFT PULLS EXCHANGE SECURITY UPDATES OVER MAIL DELIVERY ISSUES
   
   Microsoft has pulled the November 2024 Exchange security updates released
   during this month's Patch Tuesday because of email delivery issues on servers
   using custom mail flow rules.
   
    * Sergiu Gatlan
    * November 15, 2024
    * 10:23 AM
    * 0

 * Security
   
   PALO ALTO NETWORKS WARNS OF CRITICAL RCE ZERO-DAY EXPLOITED IN ATTACKS
   
   Palo Alto Networks is warning that a critical zero-day vulnerability on
   Next-Generation Firewalls (NGFW) management interfaces, currently tracked as
   'PAN-SA-2024-0015,' is actively being exploited in attacks.
   
    * Bill Toulas
    * November 15, 2024
    * 09:44 AM
    * 0

 * Deals
   
   STUDY ETHICAL HACKING IN THIS COMPREHENSIVE $40 COURSE BUNDLE DEAL
   
   This ethical hacking course bundle is a comprehensive introduction to the
   fundamentals of ethical hacking, from network penetration testing to social
   engineering, and it even gives you the chance to practice. Plus, it's only
   $39.97 for lifetime access to all course material (reg. $1,098).
   
    * BleepingComputer Deals
    * November 15, 2024
    * 07:10 AM
    * 0

 * Microsoft
   
   MICROSOFT JUST KILLED THE WINDOWS 10 BETA CHANNEL FOR GOOD
   
   Five months after reviving it in June, Microsoft has shut down the Windows 10
   Beta Channel and will move all enrolled Windows Insiders to the Release
   Preview Channel.
   
    * Sergiu Gatlan
    * November 14, 2024
    * 06:39 PM
    * 0

 * Security
   
   FRAUD NETWORK USES 4,700 FAKE SHOPPING SITES TO STEAL CREDIT CARDS
   
   A financially motivated Chinese threat actor dubbed "SilkSpecter" is using
   thousands of fake online stores to steal the payment card details of online
   shoppers in the U.S. and Europe.
   
    * Bill Toulas
    * November 14, 2024
    * 05:45 PM
    * 1

 * Security
   
   CISA WARNS OF MORE PALO ALTO NETWORKS BUGS EXPLOITED IN ATTACKS
   
   CISA warned today that two more critical security vulnerabilities in Palo
   Alto Networks' Expedition migration tool are now actively exploited in
   attacks.
   
    * Sergiu Gatlan
    * November 14, 2024
    * 05:01 PM
    * 0

 * Security
   
   NEW GLOVE INFOSTEALER MALWARE BYPASSES CHROME’S COOKIE ENCRYPTION
   
   New Glove Stealer information-stealing malware can bypass Google Chrome's
   Application-Bound (App-Bound) encryption to steal browser cookies.
   
    * Sergiu Gatlan
    * November 14, 2024
    * 03:47 PM
    * 0

 * Deals
   
   GET THIS $35 ETHICAL HACKING BUNDLE DEAL FOR THE IT JOB SEEKER ON YOUR LIST
   
   Learn Ethical Hacking From A-Z: Beginner to Expert breaks down ethical
   hacking for newcomers, making it perfect for those without prior experience,
   and it's only $34.99 (reg. $126) during the holidays.
   
    * BleepingComputer Deals
    * November 14, 2024
    * 02:15 PM
    * 0

 * Legal, Healthcare, Security
   
   HACKER GETS 10 YEARS IN PRISON FOR EXTORTING US HEALTHCARE PROVIDER
   
   Robert Purbeck, a 45-year-old man from Idaho, has been sentenced to ten years
   in prison for hacking at least 19 organizations in the United States,
   stealing the personal data of more than 132,000 people, and multiple
   extortion attempts.
   
    * Bill Toulas
    * November 14, 2024
    * 11:58 AM
    * 0

 * 1
 * 2
 * 3
 * 4
 * 5
 * 
 * 

View More
Popular Stories

 * Phishing emails increasingly use SVG attachments to evade detection

 * Security plugin flaw in millions of WordPress sites gives admin access

 * Palo Alto Networks warns of critical RCE zero-day exploited in attacks


Sponsor Posts

 * Automate all things security in the Blink of AI

 * How to leverage $200 million FCC program boosting K-12 cybersecurity

 * Cynet delivers 426% ROI in Forrester Total Economic Impact Study

 * The Actual Cost of Forgotten Passwords

 * Solving the painful password problem with better policies




FOLLOW US:

 * 
 * 
 * 
 * 
 * 

MAIN SECTIONS

 * News
 * VPN Buyer Guides
 * SysAdmin Software Guides
 * Downloads
 * Virus Removal Guides
 * Tutorials
 * Startup Database
 * Uninstall Database
 * Glossary

COMMUNITY

 * Forums
 * Forum Rules
 * Chat

USEFUL RESOURCES

 * Welcome Guide
 * Sitemap

COMPANY

 * About BleepingComputer
 * Contact Us
 * Send us a Tip!
 * Advertising
 * Write for BleepingComputer
 * Social & Feeds
 * Changelog

Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure

Copyright @ 2003 - 2024 Bleeping Computer® LLC - All Rights Reserved



LOGIN

Username
Password
Remember Me
Sign in anonymously
Sign in with Twitter

--------------------------------------------------------------------------------

Not a member yet? Register Now



Freestar.com