Interview: Florence Mottay, global CISO, Zalando
03
Dec
2025

Interview: Florence Mottay, global CISO, Zalando

Florence Mottay started her career in cyber security, researching exploits for security vulnerabilities in a small US startup. Today, she…

Leading surveillance camera vendor signs CISA’s product-security pledge
03
Dec
2025

Leading surveillance camera vendor signs CISA’s product-security pledge

Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Surveillance camera…

K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges
03
Dec
2025

K7 Antivirus Vulnerability Allows Attackers Gain SYSTEM-level Privileges

A serious privilege escalation vulnerability in K7 Ultimate Security, an antivirus product from K7 Computing, was found by abusing named…

Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges
03
Dec
2025

Longwatch RCE Flaw Allows Attackers to Run Remote Code with Elevated Privileges

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory warning about a critical remote code execution vulnerability affecting…

Print Friendly, PDF & Email
03
Dec
2025

Automation and Collective defence as the foundation to bridge the cyberskills gap

The working world is facing a severe resourcing crisis, with many industries finding their usual recruitment wells are running dry….

Architecture Patterns That Enable Cycode alternatives at Scale
03
Dec
2025

Architecture Patterns That Enable Cycode alternatives at Scale – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Choosing a security platform is more than just a feature-for-feature comparison. As organisations grow, the underlying architecture of their security…

UK national security strategy failing to account for online world
03
Dec
2025

UK national security strategy failing to account for online world

The UK’s national security strategy falls short in sufficiently accounting for the digital world’s impact on our daily lives, according…

Shadow puppets
03
Dec
2025

Deep dive into DragonForce ransomware and its Scattered Spider connection

Security researchers have conducted an in-depth analysis of DragonForce ransomware that initially emerged in 2023 and has since evolved into…

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens
03
Dec
2025

Shai-Hulud 2.0 Malware Attack Compromised 30,000 Repositories and Stolen 500 GitHub Usernames and Tokens

A significant supply chain security breach has emerged with the discovery of Shai-Hulud 2.0, a sophisticated malware that has compromised…

Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads
03
Dec
2025

Malicious Rust “evm-units” Impersonator Deploys OS-Specific Payloads

A malicious Rust crate masquerading as an Ethereum Virtual Machine (EVM) utility has been caught delivering silent, OS-specific payloads to…

remote login gotoresolve
03
Dec
2025

How attackers use real IT tools to take over your computer

A new wave of attacks is exploiting legitimate Remote Monitoring and Management (RMM) tools like LogMeIn Resolve (formerly GoToResolve) and…

Attackers Don’t Need to Breach Your API -They’ll Breach the Tools That Touch It — API Security
03
Dec
2025

Attackers Don’t Need to Breach Your API -They’ll Breach the Tools That Touch It — API Security

The API supply chain is the new security blind spot. Attackers no longer need to breach your APIs directly; they…