Category: HackRead

Cybersecurity in Crypto: Best Practices to Prevent Theft and Fraud
15
Mar
2025

Best Practices to Prevent Theft and Fraud

Cybersecurity tips to protect your cryptocurrency from hackers, scams, and fraud. Learn best practices for securing digital assets and staying…

Symantec Demonstrates OpenAI's Operator Agent in PoC Phishing Attack
14
Mar
2025

Symantec Demonstrates OpenAI’s Operator Agent in PoC Phishing Attack

Symantec’s threat hunters have demonstrated how AI agents like OpenAI’s recently launched “Operator“ could be abused for cyberattacks. While AI…

New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support
14
Mar
2025

New Microsoft 365 Phishing Scam Tricks Users Into Calling Fake Support

Cybersecurity company Guardz is warning Microsoft 365 users about a new phishing scam backed by social engineering tactics making the…

AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware
14
Mar
2025

AI Chatbot DeepSeek R1 Can Be Manipulated to Create Malware

Tenable Research reveals that AI chatbot DeepSeek R1 can be manipulated to generate keyloggers and ransomware code. While not fully…

FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware
14
Mar
2025

FBI and CISA Urge Enabling 2FA to Counter Medusa Ransomware

FBI and CISA warn of Medusa ransomware attacks impacting critical infrastructure. Learn about Medusa’s tactics, prevention tips, and why paying…

Ransomware Hits Record High: 126% Surge in Attacks in February 2025
13
Mar
2025

126% Surge in Attacks in February 2025

February 2025 saw a record 126% surge in ransomware attacks, with Cl0p leading the charge. Hackers exploited file transfer flaws,…

HealthTech Database Exposed 108GB Medical and Employment Records
13
Mar
2025

HealthTech Database Exposed 108GB Medical and Employment Records

A misconfigured database exposed 108.8 GB of sensitive data, including information on over 86,000 healthcare workers affiliated with ESHYFT, a…

New OBSCURE#BAT Malware Targets Users with Fake Captchas
13
Mar
2025

New OBSCURE#BAT Malware Targets Users with Fake Captchas

OBSCURE#BAT malware campaign exploits social engineering & fake software downloads to evade detection, steal data and persist on systems. Learn…

Using AI-Driven Cybersecurity Training to Counter Emerging Threats
13
Mar
2025

Using AI-Driven Cybersecurity Training to Counter Emerging Threats

Cary, North Carolina, March 13th, 2025, CyberNewsWire As Artificial Intelligence (AI)-powered cyber threats surge, INE Security, a global leader in…

Modat launches premier product, Modat Magnify for Cybersecurity Professionals
13
Mar
2025

Modat launches premier product, Modat Magnify for Cybersecurity Professionals

The Hague, the Netherlands, March 13th, 2025, CyberNewsWire Founded in 2024, Modat – the European-crafted, research-driven, AI-powered cybersecurity company, has…

Chinese Volt Typhoon Hackers Infiltrated US Electric Utility for Nearly a Year
13
Mar
2025

Chinese Volt Typhoon Hackers Infiltrated US Electric Grid for Nearly a Year

Cybersecurity firm Dragos has revealed a prolonged cyber attack by the Chinese threat actor Volt Typhoon into the United States…

Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks
12
Mar
2025

Picklescan Vulnerabilities Could Let Hackers Bypass AI Security Checks

Sonatype researchers uncover critical vulnerabilities in picklescan. Learn how these flaws impact AI model security, Hugging Face, and best practices…