Category: HackRead

New Codefinger Ransomware Abuses Amazon AWS to Encrypt S3 Buckets
14
Jan
2025

New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets

The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side…

AI, Web3 and Decentralization: Tech Trends Shaping 2025’s Altcoin Season
14
Jan
2025

Tech Trends Shaping 2025’s Altcoin Season

Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain, and metaverse…

Malicious Kong Ingress Controller Image Found on DockerHub
14
Jan
2025

Malicious Kong Ingress Controller Image Found on DockerHub

A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced…

3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers
13
Jan
2025

3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers

SUMMARY Indictment Filed: Three Russian nationals have been indicted for operating cryptocurrency mixers Blender.io and Sinbad.io, used to launder cybercrime…

Hackers Breach Telefónica
13
Jan
2025

Hackers Breach Telefónica’s Network, Leak 2.3 GB of Data Online

SUMMARY Telefonica confirmed a data breach involving its internal Jira ticketing system, with stolen data leaked online. Hackers used compromised…

The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?
13
Jan
2025

The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?

With the advent of virtual reality, everyone got scared that the life we ​​know will disappear, and only those who…

Fake CrowdStrike Recruiters Distribute Cryptominer Via Phishing Emails
11
Jan
2025

Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails

SUMMARY Phishing Scam Targets Job Seekers: Cybercriminals impersonate CrowdStrike recruiters to distribute cryptominer malware via fake job offers. Malware Delivery:…

Fake PoC Exploit Targets Cybersecurity Researchers with Malware
11
Jan
2025

Fake PoC Exploit Targets Cybersecurity Researchers with Malware

SUMMARY Fake PoC Exploit for CVE-2024-49113: A malicious exploit, “LDAPNightmare,” targets researchers by disguising it as a PoC for a…

Muddling Meerkat Linked to Domain Spoofing Tactics in Global Spam Scams
11
Jan
2025

Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams

SUMMARY Infoblox discovered widespread domain spoofing in spam campaigns while investigating ‘Muddling Meerkat.’ Collaboration with the cybersecurity community linked Muddling…

Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways
11
Jan
2025

Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways

SUMMARY Critical Vulnerabilities Identified: Ivanti has disclosed two critical vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Connect Secure, Policy Secure, and ZTA…

Banshee Stealer Hits macOS Users via Fake GitHub Repositories
10
Jan
2025

Banshee Stealer Hits macOS Users via Fake GitHub Repositories

SUMMARY Banshee Stealer targets macOS users, distributed via fake GitHub repositories and phishing sites. The malware steals browser credentials, cryptocurrency…

Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense
09
Jan
2025

Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense

Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving cybersecurity risks….