- Plex tells users to reset passwords after new data breachby Lawrence Abrams on September 9, 2025 at 1:03 am
Media streaming platform Plex is warning customers to reset passwords after suffering a data breach in which a hacker was able to steal customer authentication data from one of its databases. […]
- Surge in networks scans targeting Cisco ASA devices raise concernsby Bill Toulas on September 8, 2025 at 9:44 pm
Large network scans have been targeting Cisco ASA devices, prompting warnings from cybersecurity researchers that it could indicate an upcoming flaw in the products. […]
- Hackers steal 3,325 secrets in GhostAction GitHub supply chain attackby Bill Toulas on September 8, 2025 at 7:53 pm
A new supply chain attack on GitHub, dubbed ‘GhostAction,’ has compromised 3,325 secrets, including PyPI, npm, DockerHub, GitHub tokens, Cloudflare, and AWS keys. […]
- Signal adds secure cloud backups to save and restore chatsby Sergiu Gatlan on September 8, 2025 at 7:17 pm
Signal has introduced a new opt-in feature that helps users create end-to-end encrypted backups of their chats, allowing them to restore messages even if their phones are damaged or lost. […]
- Lovesac confirms data breach after ransomware attack claimsby Bill Toulas on September 8, 2025 at 6:24 pm
American furniture brand Lovesac is warning that it suffered a data breach impacting an undisclosed number of individuals, stating their personal data was exposed in a cybersecurity incident. […]
- Sports streaming piracy service with 123M yearly visits shut downby Sergiu Gatlan on September 8, 2025 at 6:12 pm
Calcio, a large piracy sports streaming platform with more than 120 million visits in the past year, was shut down following a collaborative effort by the Alliance for Creativity and Entertainment (ACE) and DAZN. […]
- Hackers hijack npm packages with 2 billion weekly downloads in supply chain attackby Sergiu Gatlan on September 8, 2025 at 4:47 pm
In a supply chain attack, attackers have injected malware into NPM packages with over 2.6 billion weekly downloads after compromising a maintainer’s account in a phishing attack. […]
- Salesloft: March GitHub repo breach led to Salesforce data theft attacksby Bill Toulas on September 8, 2025 at 3:43 pm
Salesloft says attackers first breached its GitHub account in March, leading to the theft of Drift OAuth tokens later used in widespread Salesforce data theft attacks in August. […]
- Action1 vs. Microsoft WSUS: A Better Approach to Modern Patch Managementby Sponsored by Action1 on September 8, 2025 at 1:35 pm
With WSUS deprecated, it’s time to move from an outdated legacy patching system to a modern one. Learn from Action1 how its modern patching platform offers cloud-native speed, 3rd-party coverage, real-time compliance, and zero infrastructure. Try it free now! […]
- Google to make it easier to access AI Mode as defaultby Mayank Parmar on September 8, 2025 at 12:07 am
Google plans to make it easier for users to access AI mode by allowing them to set it as the default, replacing the traditional blue links. […]
- ChatGPT makes Projects feature free, adds a toggle to split chatby Mayank Parmar on September 7, 2025 at 11:33 pm
ChatGPT’s Projects feature is now feature and second new feature allows you to create new conversations from existing conversations. […]
- iCloud Calendar abused to send phishing emails from Apple’s serversby Lawrence Abrams on September 7, 2025 at 5:10 pm
iCloud Calendar invites are being abused to send callback phishing emails disguised as purchase notifications directly from Apple’s email servers, making them more likely to bypass spam filters to land in targets’ inboxes. […]
- Czech cyber agency warns against Chinese tech in critical infrastructureby Bill Toulas on September 7, 2025 at 2:09 pm
The Czech Republic’s National Cyber and Information Security Agency (NUKIB) is instructing critical infrastructure organizations in the country to avoid using Chinese technology or transferring user data to servers located in China. […]

Bleeping Computer Cyber Security
We are an ethical website cyber security team and we perform security assessments to protect our clients.