Category: HackRead
Remember: There ain’t no such thing as a free lunch! KEY FINDINGS A supply chain attack on the Free Download…
Key findings: The MidgeDropper malware variant is a new and sophisticated threat that targets Windows users. The malware is delivered…
KEY FINDINGS AI chatbots are vulnerable to security flaws that can be exploited by threat actors to jailbreak them. Jailbreaking…
KEY FINDINGS The data breach affected over 8,000 Greater Manchester Police officers. The hackers targeted a company that produces warrant…
Key Findings The responsibility for the MGM Resorts cyberattack has been claimed ALPHV ransomware group. The attackers apparently gained access…
KEY FINDINGS Storm-0324 is a financially motivated threat actor that has been facilitating ransomware deployment and allowing access to compromised…
The least privilege principle is a crucial concept in cybersecurity that involves granting users the minimum level of access necessary…
Crypto bot trading is the use of automated software to buy and sell cryptocurrencies. These bots are programmed to follow…
Apple issues an urgent security update as the Pegasus spyware exploit is found targeting iPhones without any user interaction. Apple…
In July 2023, Hackread.com reported, based on Microsoft’s findings, that Chinese hackers from the Storm-0558 ATP group had hacked European…
Janssen CarePath data breach exposed names, contact info, insurance info, and medication data. IBM disabled a “technical method” used to…
Key Findings The vulnerabilities were found in the ProtonMail web app, which is used by most ProtonMail users. The vulnerabilities…











