BolhaSec
@bolhasec.com
660 followers
140 following
4.4K posts
#bolhasec pra ser retweetado
@sushicomabacate.com
Posts
Media
Videos
Starter Packs
BolhaSec
@bolhasec.com
· 33m
How To Simplify CISA's Zero Trust Roadmap with Modern Microsegmentation
CISA says microsegmentation isn't optional—it's foundational to Zero Trust. But legacy methods make it slow & complex. Learn from Zero Networks how modern, automated, agentless approaches make contain...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 4h
Widespread Microsoft Entra lockouts tied to new security feature rollout
Windows administrators from numerous organizations report widespread account lockouts triggered by false positives in the rollout of a new Microsoft Entra ID's "leaked credentials" detection app calle...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 6h
Windows 11 KB5067036 update rolls out Administrator Protection feature
Microsoft has released the KB5067036 preview cumulative update for Windows 11 24H2 and 25H2, which begins the rollout of the Administrator Protection cybersecurity feature and an updated Start Menu.
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 8h
Ripple's recommended XRP library xrpl.js hacked to steal wallets
The recommended Ripple cryptocurrency NPM JavaScript library named "xrpl.js" was compromised to steal XRP wallet seeds and private keys and transfer them to an attacker-controlled server, allowing thr...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 9h
Defend the Target, Not Just the Door: A Modern Plan for Google Workspace
The Salesloft Drift breach shows attackers don't need to "hack Google" — they just need to breach a trusted integration. Learn from Material Security how to secure OAuth, detect risky behavior, and pr...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 10h
New Android malware steals your credit cards for NFC relay attacks
A new malware-as-a-service (MaaS) platform named 'SuperCard X' has emerged, targeting Android devices via NFC relay attacks that enable point-of-sale and ATM transactions using compromised payment car...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 12h
Major password managers can leak logins in clickjacking attacks
Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card ...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 13h
Major telecom services provider Ribbon breached by state hackers
Ribbon Communications, a provider of telecommunications services to the U.S. government and telecom companies worldwide, revealed that nation-state hackers breached its IT network as early as December...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 15h
Self-propagating supply chain attack hits 187 npm packages
Security researchers have identified at least 187 npm packages compromised in an ongoing supply chain attack. The coordinated worm-style campaign dubbed 'Shai-Hulud' started yesterday with the comprom...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 1d
Phishing detection is broken: Why most attacks feel like a zero day
Phishing attacks now evade email filters, proxies, and MFA — making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browse...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 1d
Over 75,000 WatchGuard security devices vulnerable to critical RCE
Nearly 76,000 WatchGuard Firebox network security appliances are exposed on the public web and still vulnerable to a critical issue (CVE-2025-9242) that could allow a remote attacker to execute code w...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 1d
Redefining Security Validation with AI-Powered Breach and Attack Simulation
Security teams are drowning in threat intel — but AI is changing that. AI-powered Breach and Attack Simulation turns new threats into real, testable scenarios in minutes — delivering proof that your d...
www.bleepingcomputer.com
BolhaSec
@bolhasec.com
· 1d
Can We Trust AI To Write Vulnerability Checks? Here's What We Found
Can AI speed up writing vulnerability checks without sacrificing quality? Intruder put it to the test. Their researchers found where AI helps, where it falls short, and why human oversight is still cr...
www.bleepingcomputer.com