Category: HackRead

3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers
13
Jan
2025

3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers

SUMMARY Indictment Filed: Three Russian nationals have been indicted for operating cryptocurrency mixers Blender.io and Sinbad.io, used to launder cybercrime…

Hackers Breach Telefónica
13
Jan
2025

Hackers Breach Telefónica’s Network, Leak 2.3 GB of Data Online

SUMMARY Telefonica confirmed a data breach involving its internal Jira ticketing system, with stolen data leaked online. Hackers used compromised…

The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?
13
Jan
2025

The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?

With the advent of virtual reality, everyone got scared that the life we ​​know will disappear, and only those who…

Fake CrowdStrike Recruiters Distribute Cryptominer Via Phishing Emails
11
Jan
2025

Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails

SUMMARY Phishing Scam Targets Job Seekers: Cybercriminals impersonate CrowdStrike recruiters to distribute cryptominer malware via fake job offers. Malware Delivery:…

Fake PoC Exploit Targets Cybersecurity Researchers with Malware
11
Jan
2025

Fake PoC Exploit Targets Cybersecurity Researchers with Malware

SUMMARY Fake PoC Exploit for CVE-2024-49113: A malicious exploit, “LDAPNightmare,” targets researchers by disguising it as a PoC for a…

Muddling Meerkat Linked to Domain Spoofing Tactics in Global Spam Scams
11
Jan
2025

Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams

SUMMARY Infoblox discovered widespread domain spoofing in spam campaigns while investigating ‘Muddling Meerkat.’ Collaboration with the cybersecurity community linked Muddling…

Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways
11
Jan
2025

Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways

SUMMARY Critical Vulnerabilities Identified: Ivanti has disclosed two critical vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Connect Secure, Policy Secure, and ZTA…

Banshee Stealer Hits macOS Users via Fake GitHub Repositories
10
Jan
2025

Banshee Stealer Hits macOS Users via Fake GitHub Repositories

SUMMARY Banshee Stealer targets macOS users, distributed via fake GitHub repositories and phishing sites. The malware steals browser credentials, cryptocurrency…

Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense
09
Jan
2025

Harnessing AI for Proactive Threat Intelligence and Advanced Cyber Defense

Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving cybersecurity risks….

Cybersecurity Risks in Crypto: Phishing, Ransomware and Other Emerging Threats
09
Jan
2025

Phishing, Ransomware and Other Emerging Threats

Explore top cybersecurity risks in crypto, including phishing, ransomware, and MitM attacks. Learn practical tips to safeguard your digital assets…

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace
09
Jan
2025

Criminal IP Launches Real-Time Phishing Detection Tool on Microsoft Marketplace

Torrance, United States / California, January 9th, 2025, CyberNewsWire Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by…

Thousands of Live Hacker Backdoors Found in Expired Domains
09
Jan
2025

Thousands of Live Hacker Backdoors Found in Expired Domains

SUMMARY Cybersecurity firm watchTowr discovered over 4,000 active hacker backdoors relying on expired domain names. These backdoors are pre-existing entry…