Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
22
Jan
2026

Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers

Security vulnerabilities in the Canonical Snap Store have reached a critical level as attackers continue to distribute malicious software through…

JA3 Fingerprinting Tool Exposes Attackers' Infrastructure
22
Jan
2026

JA3 Fingerprinting Tool Exposes Attackers’ Infrastructure

JA3 fingerprinting, long dismissed as outdated technology, is experiencing a resurgence as security teams discover its practical value in identifying…

Google to Pay $8.25M Settlement Over Child Data Tracking in Play Store
22
Jan
2026

Google to Pay $8.25M Settlement Over Child Data Tracking in Play Store – Hackread – Cybersecurity News, Data Breaches, AI, and More

Is your child’s data safe? Google settles for $8.25M over claims it tracked kids under 13 without parental consent. See…

Amazon links planned mass layoff to AI
22
Jan
2026

JPMorgan CEO urges slowdown of AI roll-out to ‘save society’

JPMorgan CEO Jamie Dimon warns that the rapid roll-out of artificial intelligence (AI) throughout society will cause “civil unrest” unless…

Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems
22
Jan
2026

Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

A sophisticated malware campaign targeting unsuspecting users has emerged, disguising malicious proxyware as legitimate Notepad++ installations. This attack, orchestrated by…

Hackers Exploit Snap Domains to Inject Malicious Code into Linux Software Packages
22
Jan
2026

Hackers Exploit Snap Domains to Inject Malicious Code into Linux Software Packages

Snaps are compressed, cryptographically signed, revertable software packages for Linux desktops, servers, and embedded devices. A sophisticated campaign targeting Canonical’s…

Researchers find Jordan government used Cellebrite phone-cracking tech against activists
22
Jan
2026

Researchers find Jordan government used Cellebrite phone-cracking tech against activists

Jordanian authorities used Cellebrite phone-cracking technology to access the devices of domestic activists and human rights defenders and then extract…

Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild
22
Jan
2026

Attackers Reverse‑Engineer Patch to Exploit SmarterMail Admin Bypass in the Wild

A critical authentication bypass vulnerability in SmarterTools SmarterMail is actively being exploited in the wild by attackers, according to security…

ICE Agents Are ‘Doxing’ Themselves
22
Jan
2026

ICE Agents Are ‘Doxing’ Themselves

Last week, a website called ICE List went viral after its creators said that they had received what they described…

Multi-Stage Scheme Steals Data, Triggers UPI Payments
22
Jan
2026

Multi-Stage Scheme Steals Data, Triggers UPI Payments

A sophisticated multi-stage phishing campaign is actively targeting PNB MetLife Insurance customers through fake payment gateway pages. The attack chain…

Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans
22
Jan
2026

Hackers Are Using LinkedIn DMs and PDF Tools to Deploy Trojans – Hackread – Cybersecurity News, Data Breaches, AI, and More

ReliaQuest Threat Research has identified a new phishing campaign on LinkedIn that tricks professionals into downloading malicious files. Using DLL…

Hackers exploit Gladinet CentreStack cryptographic flaw in RCE attacks
22
Jan
2026

INC ransomware opsec fail allowed data recovery for 12 US orgs

An operational security failure allowed researchers to recover data that the INC ransomware gang stole from a dozen U.S. organizations….