GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by BleepingComputer (bleepingcomputer@infosec.exchange)

  1. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Friday, 27-Feb-2026 06:44:45 JST BleepingComputer BleepingComputer

    Google API keys for services like Maps embedded in accessible client-side code could be used to authenticate to the Gemini AI assistant and access private data.

    https://www.bleepingcomputer.com/news/security/previously-harmless-google-api-keys-now-expose-gemini-ai-data/

    In conversation about 2 days ago from infosec.exchange permalink
  2. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Monday, 16-Feb-2026 19:58:01 JST BleepingComputer BleepingComputer

    Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.

    https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/

    In conversation about 13 days ago from infosec.exchange permalink
  3. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Saturday, 14-Feb-2026 13:00:35 JST BleepingComputer BleepingComputer

    Threat actors are abusing Claude artifacts and Google Ads in ClickFix campaigns that deliver infostealer malware to macOS users searching for specific queries.

    https://www.bleepingcomputer.com/news/security/claude-llm-artifacts-abused-to-push-mac-infostealers-in-clickfix-attack/

    In conversation about 15 days ago from infosec.exchange permalink
  4. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Thursday, 05-Feb-2026 09:47:58 JST BleepingComputer BleepingComputer

    A threat actor is compromising NGINX servers in a campaign that hijacks user traffic and reroutes it through the attacker's backend infrastructure.

    https://www.bleepingcomputer.com/news/security/hackers-compromise-nginx-servers-to-redirect-user-traffic/

    In conversation about a month ago from infosec.exchange permalink
  5. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Friday, 30-Jan-2026 07:59:50 JST BleepingComputer BleepingComputer

    A new Android malware campaign is using the Hugging Face platform as a repository for thousands of variations of an APK payload that collects credentials for popular financial and payment services.

    https://www.bleepingcomputer.com/news/security/hugging-face-abused-to-spread-thousands-of-android-malware-variants/

    In conversation about a month ago from infosec.exchange permalink
  6. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Thursday, 29-Jan-2026 07:37:27 JST BleepingComputer BleepingComputer

    CISA has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered U.S. federal agencies to secure their servers within three weeks.

    https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/

    In conversation about a month ago from infosec.exchange permalink
  7. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Tuesday, 27-Jan-2026 21:29:39 JST BleepingComputer BleepingComputer

    Hackers have stolen the personal and contact information belonging to over 29.8 million SoundCloud user accounts after breaching the audio streaming platform's systems.

    https://www.bleepingcomputer.com/news/security/have-i-been-pwned-soundcloud-data-breach-impacts-298-million-accounts/

    In conversation about a month ago from infosec.exchange permalink
  8. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Thursday, 22-Jan-2026 05:01:10 JST BleepingComputer BleepingComputer

    Fortinet admins are seeing attackers exploiting a patch bypass for a previously fixed FortiGate authentication bypass (CVE-2025-59718) to hack patched firewalls.

    https://www.bleepingcomputer.com/news/security/fortinet-admins-report-patched-fortigate-firewalls-getting-hacked/

    In conversation about a month ago from infosec.exchange permalink
  9. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Tuesday, 06-Jan-2026 21:40:50 JST BleepingComputer BleepingComputer

    Microsoft has pushed back against claims that multiple prompt injection and sandbox-related issues raised by a security engineer in its Copilot AI assistant constitute security vulnerabilities. The development highlights a growing divide between how vendors and researchers define risk in generative AI systems.

    https://www.bleepingcomputer.com/news/security/are-copilot-prompt-injection-flaws-vulnerabilities-or-ai-limits/

    In conversation about 2 months ago from infosec.exchange permalink
  10. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Saturday, 20-Dec-2025 05:59:30 JST BleepingComputer BleepingComputer

    Microsoft Teams is experiencing issues, with thousands reporting problems sending messages, including delays.

    https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-teams-is-down-and-messages-are-delayed/

    In conversation about 2 months ago from infosec.exchange permalink
  11. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Saturday, 20-Dec-2025 02:23:57 JST BleepingComputer BleepingComputer

    Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism.

    https://www.bleepingcomputer.com/news/security/microsoft-365-accounts-targeted-in-wave-of-oauth-phishing-attacks/

    In conversation about 2 months ago from infosec.exchange permalink
  12. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Tuesday, 16-Dec-2025 07:49:24 JST BleepingComputer BleepingComputer

    A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.

    https://www.bleepingcomputer.com/news/security/new-santastealer-malware-steals-data-from-browsers-crypto-wallets/

    In conversation about 3 months ago from infosec.exchange permalink
  13. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Thursday, 11-Dec-2025 22:21:04 JST BleepingComputer BleepingComputer

    An unpatched zero-day vulnerability (CVE-2025-8110) in Gogs, a popular self-hosted Git service, has enabled attackers to gain remote code execution on Internet-facing instances and compromise hundreds of servers.

    https://www.bleepingcomputer.com/news/security/unpatched-gogs-zero-day-rce-flaw-actively-exploited-in-attacks/

    In conversation about 3 months ago from infosec.exchange permalink
  14. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Friday, 05-Dec-2025 02:27:38 JST BleepingComputer BleepingComputer

    A maximum severity vulnerability, dubbed 'React2Shell', in the React Server Components (RSC) 'Flight' protocol allows remote code execution without authentication in React and Next.js applications.

    https://www.bleepingcomputer.com/news/security/critical-react2shell-flaw-in-react-nextjs-lets-hackers-run-javascript-code/

    In conversation about 3 months ago from infosec.exchange permalink
  15. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Friday, 28-Nov-2025 03:41:19 JST BleepingComputer BleepingComputer

    GreyNoise Labs has launched a free tool called GreyNoise IP Check that lets users check if their IP address has been observed in malicious scanning operations, like botnet and residential proxy networks.

    https://www.bleepingcomputer.com/news/security/greynoise-launches-free-scanner-to-check-if-youre-part-of-a-botnet/

    In conversation about 3 months ago from infosec.exchange permalink
  16. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Wednesday, 26-Nov-2025 18:18:32 JST BleepingComputer BleepingComputer

    Thousands of credentials, authentication keys, and configuration data impacting organizations in sensitive sectors have been sitting in publicly accessible JSON snippets submitted to the JSONFormatter and CodeBeautify online tools that format and structure code.

    https://www.bleepingcomputer.com/news/security/code-formatters-expose-thousands-of-secrets-from-banks-govt-tech-orgs/

    In conversation about 3 months ago from infosec.exchange permalink
  17. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Monday, 24-Nov-2025 00:34:28 JST BleepingComputer BleepingComputer

    Google has added interoperability support between Android Quick Share and Apple AirDrop, to let users share files between Pixel devices and iPhones.

    https://www.bleepingcomputer.com/news/mobile/google-enables-pixel-to-iphone-file-sharing-via-quick-share-airdrop/

    In conversation about 3 months ago from infosec.exchange permalink
  18. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Tuesday, 18-Nov-2025 21:26:08 JST BleepingComputer BleepingComputer

    Cloudflare is investigating an outage affecting its global network services, with users encountering "internal server error" messages when attempting to access affected websites and online platforms.

    https://www.bleepingcomputer.com/news/technology/cloudflare-hit-by-outage-affecting-global-network-services/

    In conversation about 3 months ago from infosec.exchange permalink
  19. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Saturday, 15-Nov-2025 05:31:18 JST BleepingComputer BleepingComputer

    Fortinet has silently patched a critical zero-day vulnerability in its FortiWeb web application firewall, which is now being widely exploited.

    https://www.bleepingcomputer.com/news/security/fortinet-confirms-silent-patch-for-fortiweb-zero-day-exploited-in-attacks/

    In conversation about 4 months ago from infosec.exchange permalink
  20. Embed this notice
    BleepingComputer (bleepingcomputer@infosec.exchange)'s status on Wednesday, 12-Nov-2025 09:25:28 JST BleepingComputer BleepingComputer

    The Rhadamanthys infostealer operation has been disrupted, with numerous "customers" of the malware-as-a-service reporting that they no longer have access to their servers.

    https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/

    In conversation about 4 months ago from infosec.exchange permalink
  • Before

User actions

    BleepingComputer

    BleepingComputer

    Breaking technology news, security guides, and tutorials that help you get the most from your computer. Feel free to send us story tips at press@bleepingcomputer.com.Sometimes a bot, sometimes not.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          56787
          Member since
          7 Dec 2022
          Notices
          153
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.