Fortillect
HomeNewsForumsDocs
HomeNewsForumsDocs
Sign InSign Up

© 2025 Fortillect. All rights reserved.

Fortillect - Cybersecurity News and Intelligence Platform

Cybersecurity News

Browse the latest cybersecurity news, breaches, vulnerabilities, and trends. Filter by category to find the information most relevant to you.

Vulnerabilities and Exploits

Russian hackers bypass Gmail MFA using stolen app passwords
BleepingComputer
Jun 21, 2025

Russian hackers bypass Gmail MFA using stolen app passwords

Russian hackers bypass multi-factor authentication and access Gmail accounts by leveraging app-specific passwords in advanced social engineering attacks that impersonate U.S. Department of State officials. [...]

Read full article
WordPress Motors theme flaw mass-exploited to hijack admin accounts
BleepingComputer
Jun 21, 2025

WordPress Motors theme flaw mass-exploited to hijack admin accounts

Hackers are exploiting a critical privilege escalation vulnerability in the WordPress theme "Motors" to hijack administrator accounts and gain complete control of a targeted site. [...]

Read full article
BitoPro exchange links Lazarus hackers to $11 million crypto heist
BleepingComputer
Jun 20, 2025

BitoPro exchange links Lazarus hackers to $11 million crypto heist

The Taiwanese cryptocurrency exchange BitoPro claims the North Korean hacking group Lazarus is behind a cyberattack that led to the theft of $11,000,000 worth of cryptocurrency on May 8, 2025. [...]

Read full article
Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider
BleepingComputer
Jun 20, 2025

Cloudflare blocks record 7.3 Tbps DDoS attack against hosting provider

Cloudflare says it mitigated a record-breaking distributed denial of service (DDoS) attack in May 2025 that peaked at 7.3 Tbps, targeting a hosting provider. [...]

Read full article
Can users reset their own passwords without sacrificing security?
BleepingComputer
Jun 20, 2025

Can users reset their own passwords without sacrificing security?

Self-service password resets (SSPR) reduce helpdesk strain—but without strong security, they can open the door to attackers. Learn why phishing-resistant MFA, context-aware verification, and risk-based detection are critical to secure SSPR implementation. [..…

Read full article
Microsoft to remove legacy drivers from Windows Update for security boost
BleepingComputer
Jun 20, 2025

Microsoft to remove legacy drivers from Windows Update for security boost

Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks. [...]

Read full article
Boost Your Skills This Summer: Instructor-Led Workshop on Deep Web & Cybersecuri
BleepingComputer
Jun 20, 2025

Boost Your Skills This Summer: Instructor-Led Workshop on Deep Web & Cybersecuri

Boost Your Skills This Summer: Instructor-Led Workshop on Deep Web & Cybersecuri - posted in Backup, Imaging, and Disk Management Software: Dear Users, ever wondered what lies beneath the surface of the internet?   Join our 4-hour Live, Instructor-Led Online …

Read full article
184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach
ZDNet
Jun 20, 2025

184 million passwords for Google, Microsoft, Facebook, and more leaked in massive data breach

The file was completely exposed - no encryption, no password protection, no security - just a plain text document containing millions of sensitive data entries.

Read full article
Screen children in schools to find lazy eyes early, experts warn
BBC News
Jun 20, 2025

Screen children in schools to find lazy eyes early, experts warn

The British and Irish Orthoptic Society is calling for screening to take place in all schools in England.

Read full article
No, the 16 billion credentials leak is not a new data breach
BleepingComputer
Jun 19, 2025

No, the 16 billion credentials leak is not a new data breach

News broke today of a "mother of all breaches," sparking wide media coverage filled with warnings and fear-mongering. However, it appears to be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential…

Read full article
Godfather Android malware now uses virtualization to hijack banking apps
BleepingComputer
Jun 19, 2025

Godfather Android malware now uses virtualization to hijack banking apps

A new version of the Android malware "Godfather" creates isolated virtual environments on mobile devices to steal account data and transactions from legitimate banking apps. [...]

Read full article
Webinar: Stolen credentials are the new front door to your network
BleepingComputer
Jun 19, 2025

Webinar: Stolen credentials are the new front door to your network

Cybercriminals no longer need zero-days to breach your systems—these days, they just log in. Join BleepingComputer, SC Media, and Specops Software's Darren Siegel on July 9 at 2:00 PM ET for a live webinar on how attackers are using stolen credentials to infi…

Read full article
...