Category: HackRead

CISA and Fortinet Warns of New Critical FortiOS Zero-Day Flaws
10
Feb
2024

CISA and Fortinet Warns of New Critical FortiOS Zero-Day Flaws

Fortinet has classified both security vulnerabilities as critical. Additionally, CISA has updated its Known Exploited Vulnerabilities (KEV) Catalog with pertinent…

Accepting Ethereum (ETH) for Businesses, An Overview
09
Feb
2024

Accepting Ethereum (ETH) for Businesses, An Overview

In the rapidly evolving world of digital commerce, cryptocurrencies have emerged as a game-changer, with Ethereum at the forefront. For…

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups
09
Feb
2024

New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups

The Trojan.MAC.RustDoor backdoor is potentially linked to the notorious BlackBasta and (ALPHV/BlackCat) ransomware operators. Bitdefender researchers have discovered a new…

Over 800 Phony "Temu" Domains Lure Shoppers into Credential Theft
09
Feb
2024

Over 800 Phony “Temu” Domains Lure Shoppers into Credential Theft

Stay alert against Temu phishing scams: Cybersecurity experts warn of scammers using fake giveaways to steal credentials. Over 800 new…

Fake LastPass Password Manager App Lurks on iOS App Store
08
Feb
2024

Fake LastPass Password Manager App Lurks on iOS App Store

The popular LastPass Password Manager application has warned iOS users about a fraudulent app exploiting the app’s name circulating on…

US Credit Union Service Leaks Millions of Records and Passwords in Plain Text
08
Feb
2024

US Credit Union Service Leaks Millions of Records and Passwords in Plain Text

Uncover the risks posed by a data leak exposing over 3 million vulnerable records, internal communications, client details, and plaintext…

The Anatomy of Trading Bot Scams: Strategies for Secure Investments
08
Feb
2024

The Anatomy of Trading Bot Scams: Strategies for Secure Investments

In the fast-paced world of fintech, automation promises convenience and profitability. Trading bots, algorithms programmed to execute trades based on…

Dutch defense networks were infiltrated by Chinese state
08
Feb
2024

Chinese Hackers Infiltrate Dutch Defense Networks with Coathanger RAT

The Dutch intelligence services have warned about a growing trend of threat actors targeting edge devices, such as VPNs, email…

Data Breach Affects 66,000 in SIM-Swapping Attacks on US Insurance Giants
08
Feb
2024

Data Breach Affects 66,000 in SIM-Swapping Attacks on US Insurance Giants

The data breaches, originating from SIM-swapping attacks, occurred in November 2023 and have since sparked widespread concerns about data security….

How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages
07
Feb
2024

How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages

Delve into automated versus manual API testing for efficient software delivery. See how automation speeds validation while manual testing provides…

Chained Exploits, Stolen VPN Access: Hackers Target Ivanti Users Despite Patches
06
Feb
2024

Hackers Target Ivanti Users Despite Patches

The Shadowserver Foundation reports that a zero-day vulnerability, CVE-2024-21893 (CVSS score 8.2), disclosed by Ivanti on 31 January 2024, is…

New ResumeLooters Gang Targets Job Seekers, Steals Millions of Resumes
06
Feb
2024

New ResumeLooters Gang Targets Job Seekers, Steals Millions of Resumes

Since emerging in November 2023, ResumeLooters has exploited SQL injection and XSS vulnerabilities to compromise over 65 job-seeking websites. In…