Category: HackRead

Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite
02
Oct
2025

Google Patches “Gemini Trifecta” Vulnerabilities in Gemini AI Suite

Cybersecurity researchers at Tenable recently discovered three critical security flaws within Google’s Gemini AI assistant suite, which they’ve dubbed “Gemini…

Malicious ZIP Files Use Windows Shortcuts to Drop Malware
02
Oct
2025

Malicious ZIP Files Use Windows Shortcuts to Drop Malware

A new wave of phishing attacks has been detected by the cybersecurity research firm, Blackpoint Cyber, that is exploiting users’…

Small Businesses and Ransomware: Navigating the AI Era Threat
02
Oct
2025

Navigating the AI Era Threat

Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs….

WestJet Confirms Passenger IDs and Passports Stolen in Cyberattack
02
Oct
2025

WestJet Confirms Passenger IDs and Passports Stolen in Cyberattack

WestJet, a leading Canadian airline based in Calgary, has confirmed that a cybersecurity attack exposed personal information belonging to some…

Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks
01
Oct
2025

Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks

A new trend lately observed in the world of cybercrime is the demand for user-friendly, plug-and-play tools that make it…

Detour Dog's DNS Hijacking Infects 30,000 Websites with Strela Stealer
01
Oct
2025

Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer

New research from Infoblox Threat Intel has revealed that an established, persistent group of cybercriminals, Detour Dog, has been silently…

London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure
01
Oct
2025

London Court Convicts Chinese Mastermind Behind £5bn Crypto Seizure

The mastermind behind one of China’s largest financial frauds has pleaded guilty in a London court, confessing to her role…

Quantum Resistance and Coding for a Post-Quantum Bitcoin
01
Oct
2025

Quantum Resistance and Coding for a Post-Quantum Bitcoin

Bitcoin was created with strong cryptography, based on mathematical problems so complex that even the most powerful computers struggle to…

Chinese APT Phantom Taurus Breached MS Exchange Servers for Years
30
Sep
2025

Chinese APT Phantom Taurus Targeted MS Exchange Servers Over 3 Years

Researchers at Palo Alto Networks say a Chinese-linked cyberespionage group has been targeting foreign ministries, embassies, and military-related communications by…

US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online
30
Sep
2025

Hack of US Surveillance Provider RemoteCOM Exposes Court Data

A major data breach has compromised the personal records of nearly 14,000 individuals under court supervision, alongside contact information for…

US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online
30
Sep
2025

US Auto Insurance Platform ClaimPix Leaked 10.7TB of Records Online

A massive collection of data belonging to customers of ClaimPix, an Illinois-based platform for managing auto insurance claims across the…

Microsoft Flags AI Phishing Attack Hiding in SVG Files
30
Sep
2025

Microsoft Flags AI Phishing Attack Hiding in SVG Files

Forget the old, error-filled emails you could spot easily. Cybercriminals have completely upgraded their methods, using AI (Artificial Intelligence) to…