Category: HackRead

Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems
24
Mar
2025

Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems

A cybercriminal collective, known as Cloak, has confirmed its involvement in an attack targeting the Virginia attorney general’s office in…

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience
24
Mar
2025

Arsen Introduces AI-Powered Phishing Tests to Improve Social Engineering Resilience

Paris, France, March 24th, 2025, CyberNewsWire Arsen, a leading cybersecurity company specializing in social engineering defense, today announced the full…

Ansible vs Terraform: Which is More Secure for Infrastructure Automation?
23
Mar
2025

Which is More Secure for Infrastructure Automation?

Gartner describes infrastructure as code (IaC) as a key way to unlock the potential of the cloud. However, some companies…

How Cybercriminals Exploit Notification Channels
23
Mar
2025

How Cybercriminals Exploit Notification Channels

Cybercriminals are always looking for new ways to take advantage of people. One effective method they use is exploiting notification…

How Counterfeiters Use Technology to Fake Product Labels (and Strategies to Combat Fraud)
23
Mar
2025

How Counterfeiters Use Technology to Fake Product Labels (and Strategies to Combat Fraud)

Counterfeit products are a growing problem in today’s market. With advancements in technology, counterfeiters have become more skilled at creating…

Why AI Systems Need Red Teaming Now More Than Ever
23
Mar
2025

Why AI Systems Need Red Teaming Now More Than Ever

AI systems are becoming a huge part of our lives, but they are not perfect. Red teaming helps find weaknesses…

How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention
22
Mar
2025

How Cybercriminals Exploit Public Info for Attacks: Understanding Risks and Prevention

Cybercriminals are skilled at using public information to their advantage. Knowing how they gather this data can help you protect…

Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records
22
Mar
2025

Oracle Denies Breach Amid Hacker’s Claim of Access to 6 Million Records

A recent investigation by CloudSEK’s XVigil platform has uncovered a cyberattack targeting Oracle Cloud, resulting in the exfiltration of six…

New Phishing Scam Uses Fake Instagram Chatbot to Hijack Accounts
22
Mar
2025

New Phishing Scam Uses Fake Instagram Chatbot to Hijack Accounts

A new phishing campaign has been tricking users into giving out access to their Meta Business accounts especially Instagram. The…

Checkpoint ZoneAlarm Driver Flaw Exposes Users to Credential Theft
21
Mar
2025

Checkpoint ZoneAlarm Driver Flaw Exposes Users to Credential Theft

Credential theft alert! Venak Security discovers a BYOVD attack using .SYS drivers to bypass Windows security. Learn how this attack…

New Attacks Exploit Year-Old ServiceNow Flaws - Israel Hit Hardest
21
Mar
2025

New Attacks Exploit Year-Old ServiceNow Flaws

ServiceNow vulnerability alert: Hackers are actively exploiting year-old flaws (CVE-2024-4879, CVE-2024-5217, CVE-2024-5178) for database access. Learn how to protect your…

Where Is Computer Vision Essential Today? Insights from Alltegrio CEO
21
Mar
2025

Where Is Computer Vision Essential Today? Insights from Alltegrio CEO

Today, we are discussing Computer Vision applications, one of the most impactful AI-powered technologies that is reshaping our world, with…