
Lawrence Abrams
Owner and Editor-in-Chief at Bleeping Computer
Ransomware, Online Security, and Malware. Owner, Editor in Chief of @bleepincomputer. DM on Signal: LawrenceA.11 * https://t.co/LXVRoICs8Z
Articles
-
2 weeks ago |
bleepingcomputer.com | Lawrence Abrams
The Arkana Security extortion gang briefly listed over the weekend what appeared to be newly stolen Ticketmaster data but is instead the data stolen during the 2024 Snowflake data theft attacks. The extortion group posted screenshots of the allegedly stolen data, advertising over 569 GB of Ticketmaster data for sale, causing speculation that this was a new breach.
-
2 weeks ago |
bleepingcomputer.com | Lawrence Abrams
A significant supply chain attack hit NPM after 16 popular Gluestack 'react-native-aria' packages with over 950,000 weekly downloads were compromised to include malicious code that acts as a remote access trojan (RAT). BleepingComputer determined that the compromise began on June 6 at 4:33 PM EST, when a new version of the react-native-aria/focus package was published to NPM.
-
3 weeks ago |
bleepingcomputer.com | Lawrence Abrams
U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen from the company. Optima Tax Relief is a well-known U.S. tax resolution and settlement firm that helps individuals and businesses in addressing and fixing federal and state tax issues. The company claims to be the nation’s leading tax resolution firm, having resolved over $3 billion in tax liabilities for clients.
-
3 weeks ago |
bleepingcomputer.com | Lawrence Abrams
The FBI is warning that the BADBOX 2.0 malware campaign has infected over 1 million home Internet-connected devices, converting consumer electronics into residential proxies that are used for malicious activity. The BADBOX botnet is commonly found on Chinese Android-based smart TVs, streaming boxes, projectors, tablets, and other Internet of Things (IoT) devices.
-
3 weeks ago |
bleepingcomputer.com | Lawrence Abrams
A threat actor has re-released data from a 2021 AT&T breach affecting 70 million customers, this time combining previously separate files to directly link Social Security numbers and birth dates to individual users. AT&T told BleepingComputer that they are investigating the data but also believe it originates from the known breach and was repackaged into a new leak. "It is not uncommon for cybercriminals to repackage previously disclosed data for financial gain.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 18K
- Tweets
- 2K
- DMs Open
- Yes

ShinyHunters is the threat cluster to track this year. They, or threat actors claiming to be, are behind a lot of the attacks we are seeing. https://t.co/80tJLcdWs8

Looks like RansomEXX ransomware op is still around. 👋 https://t.co/IPN3o3oVPv

RT @Cyber_0leg: 🚨 How was Black Basta structured? What were its members’ roles? How did its infrastructure operate? Leaked chats reveal a…