Category: HackRead

A Comprehensive Guide to Investing Securely in Digital Assets
01
Mar
2024

A Comprehensive Guide to Investing Securely in Digital Assets

Entering the world of cryptocurrency might seem straightforward, but ensuring the security of your crypto funds is crucial. Understanding the…

Hackers Claim Data Breach at CutOut.Pro AI Editing Tool, Leak 20M User Info
01
Mar
2024

Hacker Leak 20 Million User Info

CutOut.Pro, an AI-powered platform specializing in image and video editing, faced a hacker’s claim of a data breach on February…

Android Money Transfer XHelper App Exposed as Money Laundering Network
29
Feb
2024

Android Money Transfer XHelper App Exposed as Money Laundering Network

The XHelper App, an APK found on third-party app stores, has been exposed over its large-scale money laundering operation involving…

Savvy Seahorse Using Fake ChatGPT, Facebook Ads in DNS Investment Scam
29
Feb
2024

Savvy Seahorse Using Fake ChatGPT, Facebook Ads in DNS Investment Scam

Infoblox cybersecurity researchers are warning users about a fraudulent scheme launched by a DNS threat actor Savvy Seahorse, which uses…

Which is Right for You?
29
Feb
2024

Which is Right for You?

While both serve similar purposes, there are specific differences between residential proxies and VPNs that users should understand to make…

NIST Releases Cybersecurity Framework 2.0Cybersecurity Framework 2.0: Guide for All Organizations
28
Feb
2024

NIST Releases Cybersecurity Framework 2.0: Guide for All Organizations

NIST’s Applied Cybersecurity Division has updated its framework to better suit the needs of a wider range of users, reflecting…

Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation
28
Feb
2024

Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation

Russian hackers, part of Russia’s Main Intelligence Directorate of the General Staff, are using compromised Ubiquiti EdgeRouters to build extensive…

New Variant of AMOS Stealer Targets Safari Cookies and Crypto Wallets
27
Feb
2024

New Variant of AMOS Stealer Targets Safari Cookies and Crypto Wallets

The new Atomic variant uses Python and Apple Script code to target browser and system files, obtain user account passwords,…

How to Avoid Data Leaks
27
Feb
2024

How to Avoid Data Leaks

The Internet offers a convenient platform for sharing data, but it also brings the risk of data leaks. A data…

INTMAX Launches Plasma Next to Scale Ethereum with Stateless Layer
27
Feb
2024

INTMAX Launches Plasma Next to Scale Ethereum with Stateless Layer

INTMAX, an innovative Layer 2 zkRollup that uses stateless architecture, has officially launched Plasma Next on the mainnet α (Alpha)….

ResurrecAds Attack Hijacks Brand Names, Spreads Spam Via 'SubdoMailing'
27
Feb
2024

ResurrecAds Attack Hijacks Brand Names, Spreads Spam Via ‘SubdoMailing’

Hackers hijacked subdomains of major brands like eBay and CBS to send spam emails disguised as legitimate messages – Learn…

LoanDepot Ransomware Attack Leads to Data Breach; 17 Million Impacted
27
Feb
2024

LoanDepot Ransomware Attack Leads to Data Breach; 17 Million Impacted

LoanDepot suffered a ransomware attack exposing the sensitive data of nearly 17 million individuals including PII data – Now, the…