Category: HackRead
Researchers claim that the Chinese Ddostf botnet is specifically designed for launching DDoS attacks and that the threat actors are…
According to eSentire, the ALPHV ransomware gang is employing the Nitrogen malware in the ongoing attacks. Cybersecurity experts at eSentire,…
Protestware is a controversial form of activism. Some people believe that it is a necessary evil to draw attention to…
As per Samsung, the data breach was a result of a vulnerability in a third-party business application. Samsung has notified…
Bitdefender informed Google of validated attack methods, but the tech giant won’t address them, citing misalignment with its threat model…
The large-scale scam campaign has been ongoing for at least two years, and the cloned websites are still operational. Online…
While domain squatting opens the door to brand hijacking, it also exposes unsuspecting users and businesses to critical cybersecurity threats…
Database security is difficult because of the large volume of attacks, zero-day exploits, human errors, and the need for continual…
An X (Twitter) account, operated by hackers using the handle @MonkeyInject, alleges that the breach was facilitated by a former…
As of 2023, there are over 1.7 million websites using Drupal, underscoring the significance of acquiring Drupal tips and tricks….
The IPStorm botnet targeted Windows, Linux, Mac, and Android devices and claimed victims in Asia, Europe, North America, and South…
The recently discovered IronWind malware is distributed via email attachments, cleverly disguised as official correspondence related to the “Economic Cooperation…











