Category: HackRead
Microsoft has warned of a sophisticated phishing scam, accompanied by the use of a custom backdoor called MediaPI, orchestrated by…
The vulnerabilities, collectively called PixieFAIL, were discovered in the network stack of EDK II, during a cursory inspection of NetworkPkg…
Scammers are creating hyper-realistic deepfakes of popular figures like Elon Musk and Michael Saylor, using them to promote fake giveaways…
Anonymous Sudan has also claimed responsibility for DDoS attacks on Thuraya Mobile Satellite Communications Company, an international mobile-satellite service (MSS)…
Cybercriminals are targeting vulnerable Docker servers by deploying two containers: a standard XMRig miner and the 9Hits viewer application—an automated…
The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware….
The iShutdown tool has been launched a few weeks after Kaspersky cybersecurity researchers revealed significant insights into Operation Triangulation. This…
Google’s New Disclaimer Confuses Users with Data Collection Admission – It All Happened After the Company Had to Face a…
The phishing scam falsely asserts that the victim’s Facebook page will be permanently deleted due to a post allegedly infringing…
The growth of online shopping has opened up opportunities for businesses. One such opportunity is the print on demand industry,…
Group-IB Global Pvt. Ltd. has revealed shocking details on Inferno Drainer, a phishing operation targeting cryptocurrency wallet providers. The scam,…
The vulnerabilities in Ivanti VPN devices enable remote, unauthenticated hackers to compromise targeted devices, execute arbitrary commands, infiltrate internal networks,…










