Cookie-stealer
03
Dec
2025

Attackers have a new way to slip past your MFA

Attackers are using a tool called Evilginx to steal session cookies, letting them bypass the need for a multi-factor authentication…

Banking Trojan Spread via WhatsApp
03
Dec
2025

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain…

Interview: Florence Mottay, global CISO, Zalando
03
Dec
2025

Interview: Florence Mottay, global CISO, Zalando

Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she…

Leading surveillance camera vendor signs CISA’s product-security pledge
03
Dec
2025

Leading surveillance camera vendor signs CISA’s product-security pledge

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera…

K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges
03
Dec
2025

K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges

A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named…

Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges
03
Dec
2025

Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting…

Print Friendly, PDF & Email
03
Dec
2025

Automation and Collective defence as the foundation to bridge the cyberskills gap

The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry….

Architecture Patterns That Enable Cycode alternatives at Scale
03
Dec
2025

Architecture Patterns That Enable Cycode alternatives at Scale – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security…

UK national security strategy failing to account for online world
03
Dec
2025

UK national security strategy failing to account for online world

The UK’s national security strategy falls short in sufficiently accounting for the digital world’s impact on our daily lives, according…

Shadow puppets
03
Dec
2025

Deep dive into DragonForce ransomware and its Scattered Spider connection

Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into…

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens
03
Dec
2025

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised…

Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads
03
Dec
2025

Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads

A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to…