Category: HackRead

Stellar Cyber and Oracle Cloud partner for enhanced Cybersecurity
14
Aug
2023

Stellar Cyber and Oracle Cloud partner for enhanced cybersecurity

Stellar Cyber partners with Oracle Cloud to enhance cybersecurity capabilities. Stellar Cyber’s Open XDR platform now available on Oracle Cloud…

Investing in Ethereum Blockchain-based JasmyCoin: Guide
14
Aug
2023

Investing in Ethereum Blockchain-based JasmyCoin: A Comprehensive Guide

This article will explore the Ethereum Blockchain-based JasmyCoin market, its advantages, how to get started with JasmyCoin investment, the related…

Data center flaws spurred disruptions, espionage and malware attacks
14
Aug
2023

Data center flaws spurred disruptions, espionage and malware attacks

Critical vulnerabilities unveiled in popular data center management platforms, posing serious security risks. CyberPower’s PowerPanel Enterprise and Dataprobe’s iBoot PDU…

South African Power Supplier Targeted with DroxiDat and Cobalt Strike
14
Aug
2023

South African Power Supplier Hit by DroxiDat Malware

Cybersecurity researchers uncover cyberattack targeting South African power-generating firm. Attackers deploy new variant of SystemBC malware, named DroxiDot, with CobaltStrike…

Hackers Leak PII Data and Photos of Plastic Surgery Patients
12
Aug
2023

Hackers Leak PII Data and Photos of Brazilian Plastic Surgery Patients

Thesnake02 hacker group exposes sensitive data from Brazilian Plastic Surgery Clinic. Breach occurred in July 2023, leaking 1.25 GB of…

MoustachedBouncer Hackers Caught Spying on Embassies
11
Aug
2023

MoustachedBouncer Hackers Caught Spying on Embassies

Belarusian MoustachedBouncer hacking group exposed for state-sponsored espionage on foreign embassies. ESET Research reveals a years-long campaign targeting diplomats in…

Phishing 3.0: Hackers Leverage AWS in Deceptive Email Campaigns
11
Aug
2023

Crooks Leverage AWS in Deceptive Email Campaigns

Cybercriminals are adopting advanced phishing tactics, using legitimate services like Amazon Web Services (AWS) to launch convincing attacks that bypass…

Feds Seize Bulletproof Hosting Service
11
Aug
2023

Feds Seize Bulletproof Hosting Service Lolek Hosted

Lolek Hosted, a prominent bulletproof hosting provider, has been dismantled in a coordinated operation by US and Polish authorities. The…

email-hacking-reigns-as-top-cybersecurity-threat-indusface-study
11
Aug
2023

Email Hacking Reigns as Top Cybersecurity Threat, Indusface Study

Sector Vulnerabilities: Indusface’s research reveals that the Education sector is the most susceptible to cyber attacks, with a staggering 78%…

EvilProxy Phishing Kit Hits Over 100 Firms, Bypass MFA with Reverse Proxy
11
Aug
2023

EvilProxy Phishing Kit Hits Over 100 Firms, Bypass MFA with Reverse Proxy

Proofpoint’s report highlights a rise in account takeovers, contradicting expectations of MFA’s effectiveness. Malicious EvilProxy phishing kit emerges as a…

INTERPOL Dismantles Infamous '16shop' Phishing-as-a-Service Platform
09
Aug
2023

INTERPOL Dismantles Infamous ’16shop’ Phishing-as-a-Service Platform

INTERPOL Dismantles ’16shop’: Global effort leads to arrests in Indonesia and Japan, targeting notorious phishing platform. Successful Intelligence Sharing: Cooperation…

Intel Responds to 'Downfall' Attack with Firmware Updates, Urges Mitigation
09
Aug
2023

Intel Responds to ‘Downfall’ Attack with Firmware Updates, Urges Mitigation

‘Downfall’ Attack Unveiled: Google researchers reveal a new side-channel attack called “Downfall” targeting Intel processors, exposing a memory optimization vulnerability…