Bleeping Computer® is an information security and technology news publication created in 2004 by Lawrence Abrams. Millions of visitors come to BleepingComputer.com every month to learn about the latest security threats, technology news, ways to stay protected online, and how to use their computers more efficiently. Here you will find the latest articles published by Bleeping computer.
BleepingComputer BleepingComputer – All Stories
- OpenAI prepares new open weight models along with GPT-5by Mayank Parmar on 2 August 2025 at 10:01 AM
OpenAI isn’t just working on GPT-5. It looks like OpenAI is also preparing to release new open-source weights, living up to its name, OpenAI.’ […]
- Anthropic says OpenAI engineers using Claude Code ahead of GPT-5 launchby Mayank Parmar on 2 August 2025 at 9:08 AM
Anthropic says it has revoked OpenAI’s access to the Claude API after ChatGPT’s engineers were found using Claude’s coding tools. […]
- OpenAI may be testing a cheaper paid plan for ChatGPTby Mayank Parmar on 1 August 2025 at 8:16 PM
OpenAI is reportedly working on a new plan called ‘Go,’ which would be cheaper than the existing $20 Plus subscription. […]
- SonicWall firewall devices hit in surge of Akira ransomware attacksby Sergiu Gatlan on 1 August 2025 at 5:28 PM
SonicWall firewall devices have been increasingly targeted since late July in a surge of Akira ransomware attacks, potentially exploiting a previously unknown security vulnerability, according to cybersecurity company Arctic Wolf. […]
- Pi-hole discloses data breach triggered by WordPress plugin flawby Sergiu Gatlan on 1 August 2025 at 4:13 PM
Pi-hole, a popular network-level ad-blocker, has disclosed that donor names and email addresses were exposed through a security vulnerability in the GiveWP WordPress donation plugin. […]
- AI-powered Cursor IDE vulnerable to prompt-injection attacksby Ionut Ilascu on 1 August 2025 at 1:00 PM
A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. […]
- Pwn2Own hacking contest pays $1 million for WhatsApp exploitby Sergiu Gatlan on 1 August 2025 at 10:40 AM
The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit at its upcoming Pwn2Own Ireland 2025 hacking contest. […]
- Kali Linux can now run in Apple containers on macOS systemsby Lawrence Abrams on 31 July 2025 at 6:46 PM
Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple’s new containerization framework. […]
- Microsoft to disable Excel workbook links to blocked file typesby Sergiu Gatlan on 31 July 2025 at 6:26 PM
Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026. […]
- Microsoft now pays up to $40,000 for some .NET vulnerabilitiesby Sergiu Gatlan on 31 July 2025 at 5:23 PM
Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core vulnerabilities. […]
- CISA open-sources Thorium platform for malware, forensic analysisby Sergiu Gatlan on 31 July 2025 at 4:43 PM
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. […]
- Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacksby Sergiu Gatlan on 31 July 2025 at 4:00 PM
Microsoft warns that a cyber-espionage group linked to Russia’s Federal Security Service (FSB) is targeting diplomatic missions in Moscow using local internet service providers. […]
Source of this article: https://www.bleepingcomputer.com/
Use this link for more sources: https://thatsthewaythecookiecrumbles.org