Blind Eagle Hackers Target Government Agencies Using PowerShell Scripts
22
Dec
2025

Blind Eagle Hackers Target Government Agencies Using PowerShell Scripts

Colombian government institutions are facing a sophisticated multi-stage cyberattack campaign orchestrated by the BlindEagle threat group, which leveraged compromised internal…

A Page From Australia's Cybersecurity Playbook: Pentesting Our Kids
22
Dec
2025

A Page From Australia’s Cybersecurity Playbook: Pentesting Our Kids

David Braue, Editor-At-Large for Cybercrime Magazine, joined host Scott Schober in a recent episode on the Cybercrime Magazine Podcast to discuss…

Pornhub logo
22
Dec
2025

Pornhub tells users to expect sextortion emails after data exposure

After a recent data breach that affected Pornhub Premium members, Pornhub has updated its online statement to warn users about…

Docker Open Sources Production-Ready Hardened Images for Free
22
Dec
2025

Docker Open Sources Production-Ready Hardened Images for Free

Docker has announced a significant shift in its container security strategy, making its Docker Hardened Images (DHI) freely available to all developers….

Nissan Discloses Data Breach Linked to Compromised Red Hat Infrastructure
22
Dec
2025

Nissan Discloses Data Breach Linked to Compromised Red Hat Infrastructure

Nissan Motor Co., Ltd. has disclosed a significant data breach affecting approximately 21,000 customers of Nissan Fukuoka Sales Co., Ltd….

Insiders Offered Cash by Cybercriminals to Bypass Company Security
22
Dec
2025

Hackers Paying Company Insiders to Bypass Security – Hackread – Cybersecurity News, Data Breaches, AI, and More

Recent research from Check Point Research (CPR) shows that cyber criminals are changing how they break into companies. Instead of…

New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs
22
Dec
2025

New Wonderland Android Malware with Bidirectional SMS-Stealing Capabilities Stealing OTPs

A sophisticated new Android malware family called Wonderland has emerged as a significant threat to users in Uzbekistan and the…

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan
22
Dec
2025

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan – Hackread – Cybersecurity News, Data Breaches, AI, and More

A popular software tool used by website owners to check their server’s health is now being used by hackers to…

How to Browse the Web More Sustainably With a Green Browser
22
Dec
2025

How to Browse the Web More Sustainably With a Green Browser

As the internet becomes an essential part of daily life, its environmental footprint continues to grow. Data centers, constant connectivity,…

Iran-linked hacking group shows renewed activity
22
Dec
2025

Iran-linked hacking group shows renewed activity

Infy Returns: Iran-linked hacking group shows renewed activity Pierluigi Paganini December 22, 2025 Researchers report renewed activity by Iran-linked Infy…

Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack
22
Dec
2025

Hackers Exploiting .onmicrosoft.com Domains to Launch TOAD Scam Attack

Cybercriminals are increasingly weaponizing legitimate Microsoft infrastructure to bypass security filters and trick users into falling for Telephone-Oriented Attack Delivery…

How an LMS Cloud Model Supports Scalable Learning
22
Dec
2025

How an LMS Cloud Model Supports Scalable Learning – Hackread – Cybersecurity News, Data Breaches, AI, and More

There’s a new era for training and development programs, making the LMS (Learning Management System) cloud model the only realistic…