Category: HackRead

Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scam
20
Nov
2023

Crypto Scammers Exploit Gaza Crisis, Deceiving Users in Donation Scams

Cybersecurity researchers reveal a new crypto donation scam manipulating the humanitarian crisis in Gaza, with scammers preying on sympathy for…

Multimillion-Dollar Vishing Scam Busted: Czech-Ukrainian Gang Arrested
19
Nov
2023

Multimillion-Dollar Vishing Scam Busted: Czech-Ukrainian Gang Arrested

Europol Warns of Growing Vishing Trend as Criminals Exploit Phone Calls for Massive Financial Gains Ukrainian and Czech police under…

Google Reveals 'Reptar' Vulnerability Threatening Intel Processors
17
Nov
2023

Google Reveals ‘Reptar’ Vulnerability Threatening Intel Processors

Google has discovered a new security vulnerability in Intel CPUs that could let attackers execute code on vulnerable systems. The…

Ddostf Botnet Resurfaces in DDoS Attacks Against MySQL and Docker Hosts
17
Nov
2023

Ddostf Botnet Resurfaces in DDoS Attacks Against MySQL and Docker Hosts

Researchers claim that the Chinese Ddostf botnet is specifically designed for launching DDoS attacks and that the threat actors are…

ALPHV (BlackCat) Ransomware Gang Uses Google Ads for Targeted Victims
16
Nov
2023

ALPHV (BlackCat) Ransomware Gang Uses Google Ads for Targeted Victims

According to eSentire, the ALPHV ransomware gang is employing the Nitrogen malware in the ongoing attacks. Cybersecurity experts at eSentire,…

New Protestware Uses npm Packages to Call for Peace in Gaza and Ukraine
16
Nov
2023

New Protestware Uses npm Packages to Call for Peace in Gaza and Ukraine

Protestware is a controversial form of activism. Some people believe that it is a necessary evil to draw attention to…

Samsung Data Breach: Hackers Steal Data of UK Customers
16
Nov
2023

Hackers Steal Data of UK Customers

As per Samsung, the data breach was a result of a vulnerability in a third-party business application. Samsung has notified…

Google Workspace Vulnerabilities Lead to Network-Wide Breaches
16
Nov
2023

Google Workspace Vulnerabilities Lead to Network-Wide Breaches

Bitdefender informed Google of validated attack methods, but the tech giant won’t address them, citing misalignment with its threat model…

Chinese Scammers Exploit Cloned Websites in Vast Gambling Network
15
Nov
2023

Chinese Scammers Exploit Cloned Websites in Vast Gambling Network

The large-scale scam campaign has been ongoing for at least two years, and the cloned websites are still operational. Online…

Domain Squatting and Brand Hijacking: A Silent Threat to Digital Enterprises
15
Nov
2023

A Silent Threat to Digital Enterprises

While domain squatting opens the door to brand hijacking, it also exposes unsuspecting users and businesses to critical cybersecurity threats…

Lesson from Casio Data Breach: Why Database Security Still a Major Challenge for Businesses?
15
Nov
2023

Why Database Security Still a Major Challenge for Businesses?

Database security is difficult because of the large volume of attacks, zero-day exploits, human errors, and the need for continual…

Hackers Claim Major Data Breach at Smart WiFi Provider Plume
15
Nov
2023

Hackers Claim Major Data Breach at Smart WiFi Provider Plume

An X (Twitter) account, operated by hackers using the handle @MonkeyInject, alleges that the breach was facilitated by a former…