WARPTECHNEWS · LAB
HomeAIBusinessTechArchive
WARPTECH NEWS

Warptech News aggrega le notizie più rilevanti da oltre 150 fonti internazionali, con classificazione AI e timeline cluster su singole storie.

Navigazione

  • Home
  • Archivio
  • Cerca
  • Il tuo account

Informazioni legali

  • Privacy Policy
  • Termini di servizio
  • Cookie Policy

© 2026 Sparktech S.R.L. — Tutti i diritti riservati. Sito gestito e manutenuto da Sparktech S.R.L.

Sede legale: Corso Libertà 55, 13100 Vercelli (VC), Italia · P.IVA / C.F. 02835910023 · Contatti: admin@warptechlab.com

Fonte

bleepingcomputer.com

33articoli totali nell'archivio

bleepingcomputer.com

Funnel Builder WordPress plugin bug exploited to steal credit cards

A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited to inject malicious JavaScript…

bleepingcomputer.com·12 h fa
bleepingcomputer.com

Microsoft Exchange, Windows 11 hacked on second day of Pwn2Own

​During the second day of Pwn2Own Berlin 2026, competitors collected $385,750 in cash awards after exploiting 15 unique zero-day…

bleepingcomputer.com·14 h fa
bleepingcomputer.com
world

Popular node-ipc npm package compromised to steal credentials

Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process…

bleepingcomputer.com·14 h fa
bleepingcomputer.com

Avada Builder WordPress plugin flaws allow site credential theft

Two vulnerabilities in the Avada Builder plugin for WordPress, with an estimated one million active installations, allow hackers…

bleepingcomputer.com·15 h fa
bleepingcomputer.com
Business

Microsoft backpedals: Edge to stop loading passwords into memory

Microsoft is updating the Edge web browser to ensure it no longer loads saved passwords into process memory in clear text at…

bleepingcomputer.com·17 h fa
bleepingcomputer.com

Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid Evolution

Stolen browser sessions and authentication tokens are becoming more valuable than stolen passwords. Flare explains how the REMUS…

bleepingcomputer.com·17 h fa
bleepingcomputer.com

Microsoft to automatically roll back faulty Windows drivers

Microsoft is introducing a new capability that will allow it to remotely roll back problematic Windows drivers delivered through…

bleepingcomputer.com·19 h fa
bleepingcomputer.com

Microsoft warns of Exchange zero-day flaw exploited in attacks

On Thursday, Microsoft shared mitigations for a high-severity Exchange Server vulnerability exploited in attacks that allow…

bleepingcomputer.com·22 h fa
bleepingcomputer.com
AI

TeamPCP hackers advertise Mistral AI code repos for sale

The TeamPCP hacker group is threatening to leak source code from the Mistral AI project unless a buyer is found for the data.

bleepingcomputer.com·1 g fa
bleepingcomputer.com

Hackers exploit auth bypass flaw in Burst Statistics WordPress plugin

Hackers are leveraging a critical authentication bypass vulnerability in the WordPress plugin Burst Statistics to obtain…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks

Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively…

bleepingcomputer.com·1 g fa
bleepingcomputer.com
AIworld

OpenAI confirms security breach in TanStack supply chain attack

OpenAI says two employees' devices were breached in the recent TanStack supply chain attack that impacted hundreds of npm and…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

Windows 11 and Microsoft Edge hacked at Pwn2Own Berlin 2026

On the first day of Pwn2Own Berlin 2026, security researchers collected $523,000 in cash awards after exploiting 24 unique…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

18-year-old NGINX vulnerability allows DoS, potential RCE

An 18-year-old flaw in the NGINX open-source web server, discovered using an autonomous scanning system, can be exploited for…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

Cyber-Enabled Cargo Crime: How Cybercrime Tradecraft is Used to Steal Freight

Cargo theft now starts with phishing emails and stolen credentials, not hijackings, to reroute and steal freight from supply…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

KongTuke hackers now use Microsoft Teams for corporate breaches

Initial access broker KongTuke has moved to Microsoft Teams for social engineering attacks, taking as little as five minutes to…

bleepingcomputer.com·1 g fa
bleepingcomputer.com
Tech

Dell confirms its SupportAssist software causes Windows BSOD crashes

Dell confirmed that its SupportAssist software is causing blue-screen crashes on some Windows systems following a wave of user…

bleepingcomputer.com·1 g fa
bleepingcomputer.com
Business

US charges suspected Dream Market admin arrested in Germany

The alleged main administrator of Dream Market Incognito Market, one of the largest dark web marketplaces before its shutdown,…

bleepingcomputer.com·1 g fa
bleepingcomputer.com

New Fragnesia Linux flaw lets attackers gain root privileges

Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

West Pharmaceutical says hackers stole data, encrypted systems

West Pharmaceutical Services disclosed that it was the target of a cyberattack that resulted in data exfiltration and system…

bleepingcomputer.com·2 g fa
bleepingcomputer.com
world

Iranian hackers targeted major South Korean electronics maker

The Iran-linked hacking group MuddyWater (a.k.a. Seedworm, Static Kitten) launched a broad cyber-espionage campaign targeting at…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

New critical Exim mailer flaw allows remote code execution

A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by an…

bleepingcomputer.com·2 g fa
bleepingcomputer.com
Tech

Windows BitLocker zero-day gives access to protected drives, PoC released

A cybersecurity researcher has published proof-of-concept (PoC) exploits for two unpatched Microsoft Windows vulnerabilities…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

Webinar tomorrow: Why security alone won't stop modern attacks

Tomorrow's webinar examines why prevention alone is no longer enough against modern cyberattacks. The session explores how…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

Microsoft fixes BitLocker recovery issue only for Windows 11 users

Microsoft has addressed a known issue causing some Windows 11 systems to boot into BitLocker recovery after installing the April…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

Microsoft fixes Windows Autopatch bug installing restricted drivers

Microsoft has fixed a Windows Autopatch bug that caused driver updates restricted by administrative policies to be deployed on…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

Foxconn confirms cyberattack claimed by Nitrogen ransomware gang

Foxconn, the world's largest electronics manufacturer, says some of its North American factories are now working to resume normal…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

73 Seconds to Breach, 24 Hours to Patch: The Case for Autonomous Validation

Attackers can compromise systems in minutes while patching and response still take hours or days. Picus Security breaks down why…

bleepingcomputer.com·2 g fa
bleepingcomputer.com

Microsoft releases Windows 10 KB5087544 extended security update

Microsoft has released the Windows 10 KB5087544 extended security update to fix the May 2026 Patch Tuesday vulnerabilities and…

bleepingcomputer.com·3 g fa
bleepingcomputer.com

Windows 11 KB5089549 & KB5087420 cumulative updates released

Microsoft has released Windows 11 KB5089549 and KB5087420 cumulative updates for versions 25H2/24H2 and 23H2 to fix security…

bleepingcomputer.com·3 g fa
bleepingcomputer.com

Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days

Today is Microsoft's May 2026 Patch Tuesday, with security updates for 120 flaws and no zero-days disclosed this month.

bleepingcomputer.com·3 g fa
bleepingcomputer.com

Instructure reaches 'agreement' with ShinyHunters to stop data leak

Instructure, the edtech giant behind the widely popular Canvas learning management system (LMS), has reached an "agreement" with…

bleepingcomputer.com·3 g fa
bleepingcomputer.com
world

Shai Hulud attack ships signed malicious TanStack, Mistral npm packages

Hundreds of packages across npm and PyPI have been compromised in a new Shai-Hulud supply-chain campaign delivering…

bleepingcomputer.com·3 g fa