Category: HackRead

Scammers Exploit JFK Files Release with Malware and Phishing
14
Feb
2025

Scammers Exploit JFK Files Release with Malware and Phishing

Veriti Research reported a developing cyber threat campaign centred around the declassification and release of the RFK, MLK and JFK…

Microsoft Warns of BadPilot Campaign as Seashell Blizzard Targets US and UK
14
Feb
2025

Microsoft Warns of BadPilot Campaign as Seashell Blizzard Targets US and UK

Russian GRU-linked hackers exploit known software flaws to breach critical networks worldwide, targeting the United States and the United Kingdom,…

Doxbin Data Breach: Hackers Leak 136,000+ User Records and Blacklist File
13
Feb
2025

Hackers Leak 136K User Records and Blacklist File

Doxbin Data Breach: Hackers leak 136,000+ user records, emails, and a ‘blacklist’ file, exposing those who paid to keep their…

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts
13
Feb
2025

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts

New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,…

FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!
13
Feb
2025

FortiOS Vulnerability Allows Super-Admin Privilege Escalation

Super-admin access vulnerability discovered in FortiOS Security Fabric. Exploitation could lead to widespread network breaches. Update now. Fortinet has released a…

A Step Forward to Digital Accessibility for All
13
Feb
2025

A Step Forward to Digital Accessibility for All

As digital inclusion gains prominence, businesses face increasing pressure to ensure their websites are accessible to users of all abilities….

Massive 1.17TB Data Leak Exposes Billions of IoT Grow Light Records
13
Feb
2025

Massive 1.17TB Data Leak Exposes Billions of IoT Grow Light Records

Massive 1.17 TB data leak exposes billions of records from a Chinese IoT grow light company. Wi-Fi passwords, IP addresses,…

Online Threats Are Rising -Here’s Why Companies Must Improve Their Cybersecurity
12
Feb
2025

Online Threats Are Rising -Here’s Why Companies Must Improve Their Cybersecurity

Cybersecurity is a must as online threats rise. Businesses must train employees, back up data, and adopt strong security practices…

Patch Tuesday: Microsoft Fixes 63 Vulnerabilities, Including Two 0-Days
12
Feb
2025

Microsoft Fixes 63 Bugs with 2 Zero-Days

Microsoft’s February Patch Tuesday addresses 63 security vulnerabilities, including two actively exploited zero-days. Update your systems now to protect against…

Apple Confirms ‘Extremely Sophisticated’ Exploit Threatening iOS Security
12
Feb
2025

Apple Confirms ‘Extremely Sophisticated’ Exploit Threatening iOS Security

Apple fixes the USB Restricted Mode flaw in iOS 18.3.1 and iPadOS 18.3.1.  Vulnerability exploited in targeted attacks. Update your…

What Is a Personal VPN? Features, Benefits, and How It Works
12
Feb
2025

What Is a Personal VPN? Features, Benefits, and How It Works

Privacy, security, and unrestricted access are the promises of a personal VPN. But what does it actually do, and why…

Monero (XMR) 2025 Prediction: What Is in Store for the Top Privacy Coin?
11
Feb
2025

What Is in Store for the Top Privacy Coin?

Monero (XMR) remains the leading privacy cryptocurrency with its unparalleled anonymity and security in a world increasingly financially surveilled. As…