Category: HackRead

Scammers Exploit California Wildfires, Posing as Fire Relief Services
16
Jan
2025

Scammers Exploit California Wildfires, Posing as Fire Relief Services

SUMMARY Cybercriminals are exploiting the California wildfires to launch phishing campaigns. Veriti Research found fake domains like “malibu-firecom” designed to…

Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes
15
Jan
2025

Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes

A recent cyberattack, mimicking the tactics of the notorious Black Basta ransomware group, targeted one of SlashNext’s clients. Within 90…

cybernewswire
15
Jan
2025

Aembit Announces Speaker Lineup for the Inaugural NHIcon

Silver Spring, United States / Maryland, January 15th, 2025, CyberNewsWire Aembit, the non-human identity and access management (IAM) company, unveiled…

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%
15
Jan
2025

Sweet Security Introduces Patent-Pending LLM-Powered Detection Engine, Reducing Cloud Detection Noise to 0.04%

Tel Aviv, Israel, January 15th, 2025, CyberNewsWire Sweet Security, a leader in cloud runtime detection and response, today announced the…

cybernewswire
15
Jan
2025

Wultra Secures €3M to Protect Financial Institutions from Quantum Threats

Prague, Czech republic, January 15th, 2025, CyberNewsWire Quantum computing is set to revolutionize technology, but it also presents a significant…

Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP
15
Jan
2025

Microsoft Discovers macOS Flaw CVE-2024-44243, Bypassing SIP

CVE-2024-44243, a critical macOS vulnerability discovered recently by Microsoft, can allow attackers to bypass Apple’s System Integrity Protection (SIP). Learn…

Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers
15
Jan
2025

Hackers Use CVE-2024-50603 to Deploy Backdoor on Aviatrix Controllers

A critical vulnerability (CVE-2024-50603) in the Aviatrix Controller allows unauthenticated RCE. Active exploitation observed by Wiz Research in the wild…

Blockchain in cybersecurity: opportunities and challenges
14
Jan
2025

Blockchain in cybersecurity: opportunities and challenges

Cybersecurity is facing new challenges with advances in AI, cloud tech, and increasing cyber threats. Solutions like blockchain are emerging…

Hackers Using Fake YouTube Links to Steal Login Credentials
14
Jan
2025

Hackers Using Fake YouTube Links to Steal Login Credentials

Cybercriminals exploit fake YouTube links to redirect users to phishing pages, stealing login credentials via URI manipulation and layered obfuscation…

New Codefinger Ransomware Abuses Amazon AWS to Encrypt S3 Buckets
14
Jan
2025

New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets

The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side…

AI, Web3 and Decentralization: Tech Trends Shaping 2025’s Altcoin Season
14
Jan
2025

Tech Trends Shaping 2025’s Altcoin Season

Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain, and metaverse…

Malicious Kong Ingress Controller Image Found on DockerHub
14
Jan
2025

Malicious Kong Ingress Controller Image Found on DockerHub

A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced…