Category: HackRead
The botnet is based on the Mirai botnet, and since it is actively updated, the new versions have additional features…
The cryptocurrency market is extremely volatile. The unpredictable nature is both good and bad for traders and investors. Regardless of…
The cybersecurity researchers at Google identified eighteen zero-day vulnerabilities, four of which allowed Hackers to remotely compromise smartphone devices using…
The malware can target Windows, macOS and Linux devices. HYAS Institute researcher and cybersecurity expert, Jeff Sims, has developed a…
Pompompurin has been charged with a single count of conspiracy to commit access device fraud. Conor Brian Fitzpatrick (aka Pompompurin,…
The attack scheme begins with the FakeCalls malware masquerading as an online banking application of a reputable South Korean financial…
Mandiant believes that a group with links to China, identified as UNC3886, is exploiting this vulnerability. According to the cybersecurity…
ESET cybersecurity researchers have discovered trojanized instant messaging apps that deliver clippers malware. According to their analysis, these Android and…
Crypto trading might be a successful method to gain money, but it is not without risks. A trader must understand…
According to a joint advisory from the US CISA (Cybersecurity and Infrastructure Security Agency), the FBI (Federal Bureau of Investigation),…
The hacker claims that, among other sensitive data, the stolen information includes data about convicts, drug cartels, witnesses, and individuals…
The server was exposed to the public without any password or security authentication, allowing access to tens of thousands of…










