Author: Cybernoz

Why Third-Party Access Remains the Weak Link in Supply Chain Security
23
Dec
2025

Why Third-Party Access Remains the Weak Link in Supply Chain Security

Why Third-Party Access Remains the Weak Link in Supply Chain Security Pierluigi Paganini December 23, 2025 Attackers exploited a supply…

Apple
23
Dec
2025

Italy fines Apple $116 million over App Store privacy policy issues

Italy’s competition authority (AGCM) has fined Apple €98.6 million ($116 million) for using the App Tracking Transparency (ATT) privacy framework…

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever
23
Dec
2025

Chinese Crypto Scammers on Telegram Are Fueling the Biggest Darknet Markets Ever

When black markets for drugs, guns, and all manner of contraband first sprang up on the dark web more than…

Pirate Group Anna's Archive Copies 256M Spotify Songs in Data Scrape
23
Dec
2025

Pirate Group Anna’s Archive Copies 256M Spotify Songs in Data Scrape – Hackread – Cybersecurity News, Data Breaches, AI, and More

In a surprising turn for the music world, a pirate activist group known as Anna’s Archive has announced that it…

Top 10 end user computing stories of 2025
23
Dec
2025

Top 10 end user computing stories of 2025

The biggest event of 2025 in the PC market has been the end of support for Windows 10. It was…

report-ad-banner
23
Dec
2025

Japan Unveils New Cybersecurity Strategy For 2025–2030

The Japanese government has formally adopted a new cybersecurity strategy that will guide national policy over the next five years. The decision…

Kuaishou blames the cyberattack on “black and grey industries” – an underground ecosystem of illegal and legally ambiguous activities that range from cybercrime to bot-driven fraud. Photo: Getty Images
23
Dec
2025

China’s Kuaishou hit by breach as explicit content floods live-streaming rooms

Short-video platform Kuaishou Technology reported a major cyberattack to the police after a breach on Monday evening allowed explicit content…

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR
23
Dec
2025

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR

A new tool named GhostLocker has been released, demonstrating a novel technique to neutralize Endpoint Detection and Response (EDR) systems…

™
23
Dec
2025

A year of Keeper Security!

Keeper Security, the provider of zero-trust and zero-knowledge cybersecurity software protecting passwords and passkeys, infrastructure secrets, remote connections and endpoints,…

Vox pop: Digital transformation across the Arab world
23
Dec
2025

UAE and Dubai’s tech ambitions in focus as Sheikh Hamdan meets Elon Musk

Dubai and the UAE’s ambitions to position themselves at the forefront of global technology development were underlined this week during…

Baker University
23
Dec
2025

Baker University says 2024 data breach impacts 53,000 people

Baker University has disclosed a data breach after attackers gained access to its network one year ago and stole the…

Hackers Using ClickFix Technique to Hide Images within the Image Files
23
Dec
2025

Hackers Using ClickFix Technique to Hide Images within the Image Files

Threat actors have evolved their attack strategies by combining the deceptive ClickFix social engineering lure with advanced steganography techniques to…