Category: HackRead

Microsoft Teams Vishing Used to Deploy Malware via TeamViewer
01
Apr
2025

Microsoft Teams Vishing Used to Deploy Malware via TeamViewer

Ontinue’s Cyber Defense Centre (CDC) recently investigated an incident that shows how a simple vishing call can turn into a…

Cryptocurrency in 2025: Exploring Bitcoin Growth, AI, and the Next Wave of Tools
01
Apr
2025

Exploring Bitcoin Growth, AI, and the Next Wave of Tools

The cryptocurrency world feels like a wild ride full of risks, twists, and big dreams of building wealth. In its…

Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access
01
Apr
2025

Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access

A hacker operating under the alias “CoreInjection” is claiming responsibility for the breach of Israeli cybersecurity company Check Point, alleging…

X (Twitter) Largest Data Breach Ever? 2.8 Billion User Info Exposed
29
Mar
2025

Twitter (X) Hit by Data Leak of 2.8 Billion Users; Allegedly an Insider Job

A data leak involving a whopping 2.87 billion Twitter (X) users has surfaced on the infamous Breach Forums. According to…

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk
29
Mar
2025

SquareX Discloses Browser-Native Ransomware that Puts Millions at Risk

Palo Alto, USA, March 28th, 2025, CyberNewsWire From WannaCry to the MGM Resorts Hack, ransomware remains one of the most…

New Morphing Meerkat Phishing Kit Exploits DNS to Spoof 100+ Brands
28
Mar
2025

New Morphing Meerkat Phishing Kit Exploits DNS to Spoof 100+ Brands

A recent analysis published by Infoblox reveals a sophisticated phishing operation, dubbed Morphing Meerkat, actively exploiting DNS vulnerabilities for years…

How to Implement CMMS Software in Your Organization
28
Mar
2025

How to Implement CMMS Software in Your Organization

Let’s face it: Rolling out new software across an entire organization can feel like herding cats. Between data migration, staff…

Engaging Online Learning: Strategies to Keep Students Focused and Motivated
28
Mar
2025

Strategies to Keep Students Focused and Motivated

While inundated with ideas, you also need to consider how to present them effectively and structure the course to engage…

Russian Phishing Attack Targets Ukraine Supporters with Fake CIA Sites
28
Mar
2025

Russian Phishing Uses Fake CIA Sites to Target Anti-war, Ukraine Supporters

Silent Push uncovers an alleged Russian intelligence phishing campaign impersonating the CIA, targeting Ukraine supporters, anti-war activists and informants. Cybersecurity…

Fake Snow White Movie Torrent Infects Devices with Malware
28
Mar
2025

Fake Snow White Movie Torrent Infects Devices with Malware

Disney’s latest Snow White movie, with a 1.6/10 IMDb rating, isn’t just the biggest flop the company has ever released….

OpenAI Bug Bounty Program Increases Top Reward to $100,000
27
Mar
2025

OpenAI Bug Bounty Program Increases Top Reward to $100,000

OpenAI is prioritizing security with a major bug bounty program increase and new AI security research grants. Find out how…

Hackers Are Using Microsoft’s .NET MAUI to Spread Android Malware
27
Mar
2025

Hackers Are Using Microsoft’s .NET MAUI to Spread Android Malware

McAfee Labs has revealed that cybercriminals are exploiting Microsoft’s newly introduced .NET MAUI app development tool to spread Android malware…