Category: HackRead

cybernewswire
30
Aug
2024

INE Security Named 2024 SC Awards Finalist

Cary, North Carolina, August 30th, 2024, CyberNewsWire INE Security is pleased to announce that it has been recognized as a…

Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers
30
Aug
2024

Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers

A year-long malware campaign targets Roblox developers using fake NPM packages mimicking “noblox.js” to steal data. Despite takedowns, new threats…

Hackers Calling Employees to Steal VPN Credentials from US Firms
29
Aug
2024

Hackers Calling Employees to Steal VPN Credentials from US Firms

A sophisticated VPN phishing and vishing campaign targeting over 130 US organizations uses social engineering tactics like phone calls and…

Marketing Trends: How to Use Big Data Effectively
29
Aug
2024

How to Use Big Data Effectively

What are the benefits of big data in marketing and SEO? Learn and find effective tactics for implementing data analysis…

Iranian State Hackers Team Up with Ransomware Gangs in Attacks on US
29
Aug
2024

Iranian State Hackers Team Up with Ransomware Gangs in Attacks on US

A joint cybersecurity advisory (CSA) by the FBI, CISA and DC3 warns of Iranian hackers partnering with ransomware gangs to…

BlackByte Ransomware Exploits New VMware Flaw in VPN-Based Attacks
29
Aug
2024

BlackByte Ransomware Exploits New VMware Flaw in VPN-Based Attacks

BlackByte ransomware group is leveraging a newly discovered VMware ESXi vulnerability and VPN access to launch a new wave of…

New LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Data
28
Aug
2024

New LummaC2 Malware Variant Uses PowerShell, Obfuscation to Steal Data

Ontinue has discovered a new LummaC2 malware variant with increased activity, using PowerShell for initial infection and employing obfuscation and…

Regardless of Market Fluctuation, Web3 Infrastructure Is Booming  
28
Aug
2024

Regardless of Market Fluctuation, Web3 Infrastructure Is Booming  

Web3’s growth demands strong infrastructure. Discover how decentralized security, verified data, and distributed AI are revolutionizing the industry. From DeFi…

New Unicode QR Code Phishing
27
Aug
2024

New Unicode QR Code Phishing Scam Bypasses Traditional Security

Cybercriminals are exploiting Unicode QR codes in a new wave of phishing attacks. This sophisticated technique bypasses traditional security measures,…

TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit
27
Aug
2024

500,000+ Members Affected by MOVEit Exploit

TDECU reports a data breach affecting over 500,000 members due to a MOVEit vulnerability. Compromised data includes Social Security numbers…

PythonAnywhere Cloud Platform Abused for Hosting Ransomware
27
Aug
2024

PythonAnywhere Cloud Platform Abused for Hosting Ransomware

Razr ransomware is exploiting PythonAnywhere to distribute and encrypt files with AES-256. ANY.RUN’s analysis reveals its behaviour, C2 communication, and…

ServiceBridge Exposes 2 TB of Sensitive Records in Cloud Misconfiguration
26
Aug
2024

2 TB of Sensitive “ServiceBridge” Records Exposed in Cloud Misconfiguration

A major database misconfiguration exposed millions of sensitive records belonging to ServiceBridge customers. Learn about the risks and consequences of…