25
Oct
2025

DHS Wants a Fleet of AI-Powered Surveillance Trucks

The US Department of Homeland Security is seeking to develop a new mobile surveillance platform that fuses artificial intelligence, radar,…

Hackers exploiting critical vulnerability in Windows Server Update Service
25
Oct
2025

Hackers exploiting critical vulnerability in Windows Server Update Service

Security researchers are warning that cyber threat actors are abusing a critical vulnerability in Microsoft Windows Server Update Service.  The…

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT
25
Oct
2025

TransparentTribe Attack Linux-Based Systems of Indian Military Organizations to Deliver DeskRAT

TransparentTribe, a Pakistani-nexus intrusion set active since at least 2013, has intensified its cyber espionage operations targeting Linux-based systems of…

How Strategy Consulting Helps You Navigate Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More
25
Oct
2025

How Strategy Consulting Helps You Navigate Risk – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

The financial industry is transforming as artificial intelligence (AI) is becoming an integral tool for managing operations, improving decision-making, and…

Hackers launch mass attacks exploiting outdated WordPress plugins
24
Oct
2025

Hackers launch mass attacks exploiting outdated WordPress plugins

A widespread exploitation campaign is targeting WordPress websites with GutenKit and Hunk Companion plugins vulnerable to critical-severity, old security issues…

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks
24
Oct
2025

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks

As the festive season approaches, organizations are witnessing a disturbing increase in targeted attacks on digital gift card systems. The…

U.S. CISA adds Motex LANSCOPE flaw to its Known Exploited Vulnerabilities catalog
24
Oct
2025

U.S. CISA adds Microsoft WSUS, and Adobe Commerce and Magento Open Source flaws to its Known Exploited Vulnerabilities catalog

U.S. CISA adds Microsoft WSUS, and Adobe Commerce and Magento Open Source flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini…

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
24
Oct
2025

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to…

Compromised YouTube Accounts Distribute Infostealer Malware
24
Oct
2025

Compromised YouTube Accounts Distribute Infostealer Malware

More than 3,000 malicious YouTube videos were used to distribute infostealer malware, according to a new report detailing the operation….

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave
24
Oct
2025

Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave

The cybersecurity landscape experienced a significant shift in July 2025 when threat actors associated with Warlock ransomware began exploiting a…

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer
24
Oct
2025

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer

A sophisticated Python-based remote access trojan has emerged in the gaming community, disguising itself as a legitimate Minecraft client to…

Everest Ransomware Claims AT&T Careers Breach with 576K Records
24
Oct
2025

Everest Ransomware Claims AT&T Careers Breach with 576K Records – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

A listing on the dark web data leak site run by the Everest ransomware group claims it holds 576,686 personal…