Category: HackRead
Cybersecurity researchers reveal a new crypto donation scam manipulating the humanitarian crisis in Gaza, with scammers preying on sympathy for…
Europol Warns of Growing Vishing Trend as Criminals Exploit Phone Calls for Massive Financial Gains Ukrainian and Czech police under…
Google has discovered a new security vulnerability in Intel CPUs that could let attackers execute code on vulnerable systems. The…
Researchers claim that the Chinese Ddostf botnet is specifically designed for launching DDoS attacks and that the threat actors are…
According to eSentire, the ALPHV ransomware gang is employing the Nitrogen malware in the ongoing attacks. Cybersecurity experts at eSentire,…
Protestware is a controversial form of activism. Some people believe that it is a necessary evil to draw attention to…
As per Samsung, the data breach was a result of a vulnerability in a third-party business application. Samsung has notified…
Bitdefender informed Google of validated attack methods, but the tech giant won’t address them, citing misalignment with its threat model…
The large-scale scam campaign has been ongoing for at least two years, and the cloned websites are still operational. Online…
While domain squatting opens the door to brand hijacking, it also exposes unsuspecting users and businesses to critical cybersecurity threats…
Database security is difficult because of the large volume of attacks, zero-day exploits, human errors, and the need for continual…
An X (Twitter) account, operated by hackers using the handle @MonkeyInject, alleges that the breach was facilitated by a former…