Tenda N300 Flaws Allow Attackers to Run Commands as Root
24
Nov
2025

Tenda N300 Flaws Allow Attackers to Run Commands as Root

High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing…

PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
24
Nov
2025

PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks

A proof-of-concept exploit has been publicly released for CVE-2025-9501, a critical, unauthenticated command-injection vulnerability affecting W3 Total Cache, one of…

North Korean Scam Job Platform Targets U.S. AI Developers
24
Nov
2025

North Korean Scam Job Platform Targets U.S. AI Developers

A sophisticated new variant of the North Korean-linked Contagious Interview campaign has emerged, featuring an unprecedented level of polish and…

Notification icon
24
Nov
2025

Matrix Push C2 abuses browser notifications to deliver phishing and malware

Cybercriminals are using browser push notifications to deliver malware and phishing attacks. Researchers at BlackFog described how a new command-and-control…

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
24
Nov
2025

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight…

Australian scaleup to bring AI-led data protection to the MoD
24
Nov
2025

Chief data officers hire for tech innovation

While the role of chief digital officer (CDO) is regarded as quite diverse, a study from Deloitte suggests CDO’s recognise…

Hackers steal sensitive data from major banking industry vendor
24
Nov
2025

Hackers steal sensitive data from major banking industry vendor

Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. One of…

Cybersecurity
24
Nov
2025

Why It’s Time for Cloud-native Patching

Author: Gene Moody, Field CTO at Action1 For many IT leaders, the warning signs appeared gradually: devices slipping out of…

800+ npm Packages and Thousands of GitHub Repos Compromised
24
Nov
2025

800+ npm Packages and Thousands of GitHub Repos Compromised

A massive resurgence of the Sha1-Hulud supply chain malware has struck the open-source ecosystem, compromising over 800 npm packages and…

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads
24
Nov
2025

New EtherHiding Technique Uses Web Attacks to Deploy Malware and Rotate Payloads

A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate…

19,000 Repos Hit: New Shai Hulud Worm Wave Steals Developer Secrets
24
Nov
2025

Shai Hulud npm Worm Infects 19,000 Packages in Major Supply Chain Attack – Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

The Shai Hulud npm worm has re-emerged, launching an aggressive new attack on the software development world. This worm, which…

This campaign aims to tackle persistent security myths in favor of better advice
24
Nov
2025

This campaign aims to tackle persistent security myths in favor of better advice

Some cybersecurity advice has been around for ages: Frequently change passwords, avoid public Wi-Fi. But most experts say a lot…