Advertisement · 728 × 90
#
Hashtag
#bleepingcomputer
Advertisement · 728 × 90
Preview
Medtech giant Stryker fully operational after data-wiping attack Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the…

医療機器大手ストライカー社、データ消去攻撃後も完全に業務を再開

Medtech giant Stryker fully operational after data-wiping attack #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

1 0 0 0
Preview
Residential proxies evaded IP reputation checks in 78% of 4B sessions Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users.

住宅用プロキシは、40億セッションのうち78%でIPレピュテーションチェックを回避した

Residential proxies evaded IP reputation checks in 78% of 4B sessions #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector.

攻撃者は空き家を悪用して郵便物を傍受するハイブリッド型サイバー犯罪

Adversaries Exploit Vacant Homes to Intercept Mail in Hybrid Cybercrime #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Claude Code leak used to push infostealer malware on GitHub Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware.

ClaudeのコードリークがGitHub上で情報窃盗マルウェアを拡散するために利用された

Claude Code leak used to push infostealer malware on GitHub #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

1 0 0 0
Preview
Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks Internet security watchdog Shadowserver has found over 14,000 BIG-IP APM instances exposed online amid ongoing attacks exploiting a critical-severity remote code execution (RCE) vulnerability.

14,000を超えるF5 BIG-IP APMインスタンスが依然としてRCE攻撃にさらされている

Over 14,000 F5 BIG-IP APM instances still exposed to RCE attacks #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Critical Cisco IMC auth bypass gives attackers Admin access Cisco has patched several critical and high-severity vulnerabilities, including an Integrated Management Controller (IMC) authentication bypass that enables attackers to gain Admin access.

Cisco IMCの認証バイパスの重大な脆弱性により、攻撃者が管理者権限を取得できる

Critical Cisco IMC auth bypass gives attackers Admin access #BleepingComputer (Apr 2)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Google Drive ransomware detection now on by default for paying users Google announced that the AI-powered Google Drive ransomware detection feature has reached general availability and is now enabled by default for all paying users.

Google Driveのランサムウェア検出機能が、有料ユーザー向けにデフォルトで有効になりました

Google Drive ransomware detection now on by default for paying users #BleepingComputer (Apr 1)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Routine Access Is Powering Modern Intrusions, a New Threat Report Finds Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive…

日常的なアクセスが現代の侵入を助長していることが、新たな脅威レポートで判明

Routine Access Is Powering Modern Intrusions, a New Threat Report Finds #BleepingComputer (Apr 1)

www.bleepingcomputer.com/news/securit...

0 1 0 0
Preview
New Windows 11 emergency update fixes preview update install issues Microsoft released an emergency update to fix the March 2026 KB5079391 non-security preview update, which was pulled over the weekend due to installation issues.

Windows 11の新しい緊急アップデートでプレビューアップデートのインストールに関する問題が修正されます

New Windows 11 emergency update fixes preview update install issues #BleepingComputer (Apr 1)

www.bleepingcomputer.com/news/microso...

0 0 0 0
Preview
Apple expands iOS 18 updates to more iPhones to block DarkSword attacks Apple has now made it possible for more iPhones still running iOS 18 to receive security updates that protect against the actively exploited DarkSword exploit kit.

Appleは、DarkSword攻撃を阻止するため、iOS 18アップデートの対象iPhoneを拡大した

Apple expands iOS 18 updates to more iPhones to block DarkSword attacks #BleepingComputer (Apr 1)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
FBI warns against using Chinese mobile apps due to privacy risks The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers.

FBIはプライバシーリスクのため、中国製モバイルアプリの使用を控えるよう警告している

FBI warns against using Chinese mobile apps due to privacy risks #BleepingComputer (Apr 1)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
How to Categorize AI Agents and Prioritize Risk AI agent risk isn't equal, it scales with access to systems and level of autonomy. Token Security explains how CISOs should categorize agents and prioritize what to secure first.

AIエージェントの分類方法とリスクの優先順位付け

How to Categorize AI Agents and Prioritize Risk #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/securit...

1 0 0 0
Preview
Cisco source code stolen in Trivy-linked dev environment breach Cisco has suffered a cyberattack after threat actors used stolen credentials from the recent Trivy supply chain attack to breach its internal development environment and steal source code belonging…

Trivy関連の開発環境侵害でCiscoのソースコードが盗まれる

Cisco source code stolen in Trivy-linked dev environment breach #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Google now allows you to change your @gmail.com address Google is rolling out a new feature in the U.S. that allows users to change their @gmail address or create a new alias.

Googleでは、@gmail.comのアドレスを変更できるようになりました

Google now allows you to change your @gmail.com address #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/google/...

0 0 0 0
Preview
CISA orders feds to patch actively exploited Citrix flaw by Thursday The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered government agencies to patch their Citrix NetScaler appliances against an actively exploited vulnerability by Thursday.

CISAは、悪用されているCitrixの脆弱性を木曜日までに修正するよう連邦政府に命じた。

CISA orders feds to patch actively exploited Citrix flaw by Thursday #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Claude AI finds Vim, Emacs RCE bugs that trigger on file open Vulnerabilities in the Vim and GNU Emacs text editors, discovered using simple prompts with the Claude assistant, allow remote code execution simply by opening a file.

Claude AIが、ファイルオープン時に発生するVimとEmacsのリモートコード実行バグを発見

Claude AI finds Vim, Emacs RCE bugs that trigger on file open #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
GIGABYTE Control Center vulnerable to arbitrary file write flaw The GIGABYTE Control Center is vulnerable to an arbitrary file-write flaw that could allow a remote, unauthenticated attacker to access files on vulnerable hosts.

GIGABYTE Control Centerに任意のファイル書き込みの脆弱性がある

GIGABYTE Control Center vulnerable to arbitrary file write flaw #BleepingComputer (Mar 31)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Healthcare tech firm CareCloud says hackers stole patient data Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours.

医療テクノロジー企業CareCloudは、ハッカーが患者データを盗んだと発表した

Healthcare tech firm CareCloud says hackers stole patient data #BleepingComputer (Mar 30)

www.bleepingcomputer.com/news/securit...

1 0 0 0
Preview
Critical Fortinet Forticlient EMS flaw now exploited in attacks Attackers are now actively exploiting a critical vulnerability in Fortinet's FortiClient EMS platform, according to threat intelligence company Defused.

Fortinet Forticlient EMSの重大な脆弱性が攻撃に悪用される

Critical Fortinet Forticlient EMS flaw now exploited in attacks #BleepingComputer (Mar 30)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now F5 has reclassified a BIG-IP APM denial-of-service (DoS) vulnerability as a critical-severity remote code execution (RCE) flaw, warning that attackers are exploiting it to deploy webshells on…

ハッカーがF5 BIG-IPの重大な脆弱性を悪用した攻撃を仕掛けています。今すぐパッチを適用してください。

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now #BleepingComputer (Mar 30)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Apple adds macOS Terminal warning to block ClickFix attacks Apple has introduced a security feature in macOS Tahoe 26.4 that blocks pasting and executing potentially harmful commands in Terminal and alerts users to possible risks.

AppleがClickFix攻撃を阻止するためmacOSターミナルに警告を追加

Apple adds macOS Terminal warning to block ClickFix attacks #BleepingComputer (Mar 30)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Critical Citrix NetScaler memory flaw actively exploited in attacks Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix  NetScaler ADC and NetScaler Gateway appliances to obtain sensitive data.

Citrix NetScalerの重大なメモリ脆弱性が攻撃で悪用されている

Critical Citrix NetScaler memory flaw actively exploited in attacks #BleepingComputer (Mar 30)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Fake VS Code alerts on GitHub spread malware to developers A large-scale campaign is targeting developers on GitHub with fake Visual Studio Code (VS Code) security alerts posted in the Discussions section of various projects, to trick users into downloading…

GitHub上の偽のVS Code警告が開発者にマルウェアを拡散

Fake VS Code alerts on GitHub spread malware to developers #BleepingComputer (Mar 27)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
TikTok for Business accounts targeted in new phishing campaign Threat actors are targeting TikTok for Business accounts in a phishing campaign that prevents security bots from analyzing malicious pages.

TikTokビジネスアカウントが新たなフィッシングキャンペーンの標的に

TikTok for Business accounts targeted in new phishing campaign #BleepingComputer (Mar 26)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
New Infinity Stealer malware grabs macOS data via ClickFix lures A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler.

新たなInfinity StealerマルウェアがClickFixの罠を利用してmacOSデータを盗み出す

New Infinity Stealer malware grabs macOS data via ClickFix lures #BleepingComputer (Mar 28)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Original post on mastodon.uno

Commissione UE conferma cyberattacco alla piattaforma cloud

La Commissione europea ha confermato un accesso non autorizzato alla piattaforma cloud che ospita i siti europe.eu. Secondo le fonti di Bleeping Computer, ignoti cybercriminali hanno compromesso un account AWS e rubato oltre 350 GB di […]

0 2 0 0
Preview
TP-Link warns users to patch critical router auth bypass flaw TP-Link has patched several vulnerabilities in its Archer NX router series, including a critical-severity flaw that may allow attackers to bypass authentication and upload new firmware.

TP-Linkは、ルーターの認証バイパスに関する重大な脆弱性を修正するようユーザーに警告しています

TP-Link warns users to patch critical router auth bypass flaw #BleepingComputer (Mar 25)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Citrix urges admins to patch NetScaler flaws as soon as possible Citrix has patched two NetScaler ADC and NetScaler Gateway vulnerabilities, one of which is very similar to the CitrixBleed and CitrixBleed2 flaws exploited in zero-day attacks in recent years.

Citrixは、NetScalerの脆弱性をできるだけ早く修正するよう管理者に強く求めている

Citrix urges admins to patch NetScaler flaws as soon as possible #BleepingComputer (Mar 25)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
Bubble AI app builder abused to steal Microsoft account credentials Threat actors are evading phishing detection in campaigns targeting Microsoft accounts by abusing the no-code app-building platform Bubble to generate and host malicious web apps.

Bubble AIアプリビルダーが悪用され、Microsoftアカウントの認証情報が盗まれる

Bubble AI app builder abused to steal Microsoft account credentials #BleepingComputer (Mar 25)

www.bleepingcomputer.com/news/securit...

0 0 0 0
Preview
PolyShell attacks target 56% of all vulnerable Magento stores Attacks leveraging the 'PolyShell' vulnerability in version 2 of Magento Open Source and Adobe Commerce installations are underway, targeting more than half of all vulnerable stores.

PolyShell攻撃は、脆弱なMagentoストア全体の56%を標的にしている

PolyShell attacks target 56% of all vulnerable Magento stores #BleepingComputer (Mar 25)

www.bleepingcomputer.com/news/securit...

0 0 0 0