Category: HackRead
SUMMARY Dubbed AuthQuake; the flaw in Microsoft MFA allowed attackers to bypass security measures and access accounts. Vulnerability impacted Azure,…
SUMMARY A sophisticated phishing campaign is targeting employees of 30+ companies across 12 industries worldwide. Over 200 malicious links have…
SUMMARY The new DCOM attack leverages Windows Installer service for stealthy backdoor deployment. Attack exploits the IMsiServer interface for remote…
SUMMARY Black Basta Campaign Resurgence: Rapid7 researchers report a sophisticated social engineering campaign by the Black Basta ransomware group, refining…
SUMMARY: Critical Vulnerability Alert: Dell Power Manager versions before 3.17 have a high-severity access control flaw (CVE-2024-49600) allowing attackers to…
SUMMARY AppLite Trojan: A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive…
The Digital Operational Resilience Act (DORA) sets strict EU rules for financial institutions and IT providers, emphasizing strong cyber risk…
Summary Large-Scale Hacking Operation Uncovered: Researchers link ShinyHunters and Nemesis to an operation exploiting millions of websites to steal over…
Protect your systems with automated patching and server hardening strategies to defend against vulnerabilities like the NTLM zero-day. Stay proactive…
Summary: Phishing Operation Dismantled: A joint effort by Belgian, Dutch authorities, and Europol dismantled a phishing gang that targeted victims…
Discover essential tips to secure your digital assets like crypto, NFTs, and tokens. Learn about wallet safety, avoiding phishing, 2FA,…
KEY POINTS Cybersecurity researchers at ReversingLabs found that hackers used malicious code to combine the Ultralytics AI library to mine…