Category: HackRead

How Attackers Use Corrupted Files to Slip Past Security
03
Dec
2024

How Attackers Use Corrupted Files to Slip Past Security

New zero-day attack bypasses antivirus, sandboxes, and spam filters using corrupted files. Learn how ANY.RUN’s sandbox detects and combats these…

New Rockstar 2FA Phishing-as-a-Service Kit Targets Microsoft 365 Accounts
03
Dec
2024

New Rockstar 2FA Phishing-as-a-Service Kit Targets Microsoft 365 Accounts

SUMMARY Rockstar 2FA Exposed: Trustwave uncovers Rockstar 2FA, a phishing-as-a-service (PhaaS) platform targeting Microsoft 365 accounts with advanced tools. 2FA…

cybernewswire
03
Dec
2024

Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified Detection & Response Platform

Tel Aviv, ISRAEL, December 3rd, 2024, CyberNewsWire Sweet Security Introduces Evolutionary Leap in Cloud Detection and Response, Releasing First Unified…

SmokeLoader Malware Exploits MS Office Flaws to Steal Browser Data
02
Dec
2024

SmokeLoader Malware Exploits MS Office Flaws to Steal Browser Data

SUMMARY Targeted Campaign: SmokeLoader malware attacks Taiwanese industries, including manufacturing, healthcare, and IT. Phishing Emails: The campaign uses phishing emails…

Op HAECHI V: Interpol Arrests 5,500 Cybercriminals, Recovers $400 Million
02
Dec
2024

Interpol Arrests 5,500 Cybercriminals, Recovers $400 Million

SUMMARY Global Crackdown: INTERPOL’s Operation HAECHI V led to 5,500 arrests across 40 countries. Major Recovery: $400 million in stolen…

Hackers Drain $1.48 Billion from Crypto in 2024, Led by DeFi Exploits
02
Dec
2024

Hackers Drain $1.48 Billion from Crypto in 2024, Led by DeFi Exploits

SUMMARY: Crypto losses in November 2024 totalled $71 million, marking a 79% decrease from the same month in 2023. DeFi…

Why Simulating Phishing Attacks Is the Best Way to Train Employees
01
Dec
2024

Why Simulating Phishing Attacks Is the Best Way to Train Employees

Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms of social…

Top AI Trends of 2025 Businesses Should Be Ready For
01
Dec
2024

Top AI Trends of 2025 Businesses Should Be Ready For

Let’s admit it, everyone is tired of hearing about Artificial Intelligence (AI). It’s the tech world’s favourite trendy term, and…

FBI-Wanted Hacker Behind Global Ransomware Attacks Arrested in Russia
30
Nov
2024

FBI-Wanted Hacker Behind Global Ransomware Attacks Arrested in Russia

SUMMARY FBI-Wanted Hacker Arrested: Russian authorities have reportedly detained Mikhail Pavlovich Matveev, known by aliases like Wazawaka and Boriselcin. Cybercrime…

Hackers Exploit Godot Game Engine to Deliver GodLoader Malware
29
Nov
2024

Godot Engine Exploited to Spread Malware on Windows, macOS, Linux

SUMMARY Cybercriminals are exploiting the Godot game engine to deliver malware called GodLoader, targeting multiple platforms like Windows, macOS, and…

How Python Software Development Enhances Cyber Defense
29
Nov
2024

How Python Software Development Enhances Cyber Defense

Python has emerged as a powerful ally in combating rising cybersecurity threats and tracking cybercrime through tools leveraging threat intelligence….

Fake Betting Apps Using AI-Generated Voices to Steal Data
29
Nov
2024

Fake Betting Apps Using AI-Generated Voices to Steal Data

SUMMARY Scammers Use Fake Ads: Cybercriminals are creating fake betting app ads to lure users and steal money and personal…