Category: HackRead

Microsoft Bookings Flaw Enables Account Hijacking and Impersonation
11
Nov
2024

Microsoft Bookings Flaw Enables Account Hijacking and Impersonation

A vulnerability in Microsoft Bookings can expose your organization to serious security risks. Learn how attackers can exploit this flaw…

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace
11
Nov
2024

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

TEL AVIV, Israel, November 11th, 2024, CyberNewsWire Customers can now easily integrate Sweet’s runtime detection and response platform into their…

Bitcoin Fog Operator Gets 12.5 Years for Longest-Running Bitcoin Laundering
11
Nov
2024

Bitcoin Fog Operator Gets 12.5 Years for Longest-Running Bitcoin Laundering

Bitcoin Fog operator sentenced to 12.5 years for laundering $400M in crypto. The dark web’s longest-running mixer processed 1.2M bitcoin…

CISA Urges Patching of Critical Palo Alto Networks’ Expedition Tool Vulnerability
11
Nov
2024

CISA Urges Patching of Critical Palo Alto Networks’ Expedition Tool Vulnerability

A critical security vulnerability in Palo Alto Networks’ Expedition tool is being actively exploited by hackers. CISA urges patch –…

The Importance of Effective Incident Response
11
Nov
2024

The Importance of Effective Incident Response

With cybersecurity threats continuously evolving, having a strong incident response (IR) plan is crucial for businesses of all sizes. Effective…

Hackers Use Excel Files to Deliver Remcos RAT Variant on Windows
09
Nov
2024

Hackers Use Excel Files to Deliver Remcos RAT Variant on Windows

This article explains the inner workings of the Remcos RAT, a dangerous malware that uses advanced techniques to infect Windows…

Mazda’s infotainment system vulnerabilities
08
Nov
2024

Hackers Can Access Mazda Vehicle Controls Via System Vulnerabilities

Hackers can exploit critical vulnerabilities in Mazda’s infotainment system, including one that enables code execution via USB, compromising your car’s…

New SteelFox Malware Posing as Popular Software to Steal Browser Data
08
Nov
2024

New SteelFox Malware Posing as Popular Software to Steal Browser Data

SteelFox malware targets software pirates through fake activation tools, stealing credit card data and deploying crypto miners. Learn about this…

Fabrice Malware on PyPI Has Been Stealing AWS Credentials for 3 Years
07
Nov
2024

Fabrice Malware on PyPI Has Been Stealing AWS Credentials for 3 Years

The malicious Python package “Fabrice” on PyPI mimics the “Fabric” library to steal AWS credentials, affecting thousands. Learn how it works…

Androxgh0st Botnet Integrates Mozi, Expands Attacks on IoT Vulnerabilities
07
Nov
2024

Androxgh0st Botnet Integrates Mozi, Expands Attacks on IoT Vulnerabilities

CloudSEK reports that the Androxgh0st botnet has integrated with the Mozi botnet and exploits a wide range of vulnerabilities in…

North Korean Hackers Use Fake News to Spread 'Hidden Risk' Malware
07
Nov
2024

North Korean Hackers Use Crypto Fake News to Spread ‘Hidden Risk’ Malware

North Korean hackers are targeting cryptocurrency businesses with a sophisticated new malware campaign, dubbed “Hidden Risk.” Learn how this stealthy…

Scammers Target BASE and Ethereum with Political Meme Coins and Rug Pulls
06
Nov
2024

Scammers Target BASE and Ethereum with Political Meme Coins and Rug Pulls

Trugard Labs has revealed a series of major threats plaguing blockchain networks, particularly in emerging and fast-growing chains like BASE,…