Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments
25
Oct
2025

Agenda Ransomware Actors Deploying Linux RAT on Windows Systems Targeting VMware Deployments

Cybersecurity researchers have uncovered a sophisticated ransomware campaign where Agenda group threat actors are deploying Linux-based ransomware binaries directly on…

New Text Message Based Phishing Attack from China Targeting Users Around the Globe
25
Oct
2025

New Text Message Based Phishing Attack from China Targeting Users Around the Globe

A sophisticated text message phishing campaign originating from China has emerged as one of the most extensive cybersecurity threats targeting…

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks
25
Oct
2025

Decoding PIN-Protected BitLocker Through TPM SPI Analysis To Decrypt And Mount The Disks

BitLocker keys without PIN protection, where attackers could exploit stolen laptops, researchers now delve into PIN-secured setups, targeting insider threats…

More than 60 UN members sign cybercrime treaty in Vietnam amid rights concerns
25
Oct
2025

More than 60 UN members sign cybercrime treaty in Vietnam amid rights concerns

Countries signed their first UN treaty targeting cybercrime in Hanoi on Saturday, despite opposition from an unlikely band of tech…

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild
25
Oct
2025

CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned organizations worldwide about active exploitation of a critical remote code…

25
Oct
2025

New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts

A sophisticated malware campaign targeting WordPress sites has emerged, utilizing PHP variable functions and cookie-based obfuscation to evade traditional security…

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers
25
Oct
2025

Threat Actors Tricks Target Users Via Impersonation and Fictional Financial Aid Offers

An international ecosystem of sophisticated scam operations has emerged, targeting vulnerable populations through impersonation tactics and fraudulent financial aid promises….

25
Oct
2025

DHS Wants a Fleet of AI-Powered Surveillance Trucks

The US Department of Homeland Security is seeking to develop a new mobile surveillance platform that fuses artificial intelligence, radar,…

Hackers exploiting critical vulnerability in Windows Server Update Service
25
Oct
2025

Hackers exploiting critical vulnerability in Windows Server Update Service

Security researchers are warning that cyber threat actors are abusing a critical vulnerability in Microsoft Windows Server Update Service.  The…

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
25
Oct
2025

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage operations targeting Linux-based systems of…

How Strategy Consulting Helps You Navigate Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
25
Oct
2025

How Strategy Consulting Helps You Navigate Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

The financial industry is transforming as artificial intelligence (AI) is becoming an integral tool for managing operations, improving decision-making, and…

Hackers launch mass attacks exploiting outdated WordPress plugins
24
Oct
2025

Hackers launch mass attacks exploiting outdated WordPress plugins

A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues…