AI security risks are also cultural and developmental
05
Jan
2026

AI security risks are also cultural and developmental

Security teams spend much of their time tracking vulnerabilities, abuse patterns, and system failures. A new study argues that many…

Sedgwick discloses data breach after TridentLocker ransomware attack
05
Jan
2026

Sedgwick discloses data breach after TridentLocker ransomware attack

Sedgwick discloses data breach after TridentLocker ransomware attack Pierluigi Paganini January 05, 2026 Sedgwick confirmed a cyber incident at its…

Pharma's most underestimated cyber risk isn't a breach
05
Jan
2026

Pharma’s most underestimated cyber risk isn’t a breach

Chirag Shah, Global Information Security Officer & DPO at Model N examines how cyber risk in pharma and life sciences…

European Space Agency Confirms Cybersecurity Breach
05
Jan
2026

European Space Agency Confirms Cybersecurity Incident

The European Space Agency (ESA) has confirmed a cybersecurity breach involving servers located outside its corporate network. This confirmation comes…

report-ad-banner
05
Jan
2026

HitBTC Exchange Faces Critical Security Warning

A newly disclosed security warning has drawn attention to potential risks at the HitBTC Exchange after blockchain security firm SlowMist…

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data
05
Jan
2026

Multiple Vulnerabilities in QNAP Tools Let Attackers Obtain Secret Data

QNAP has patched multiple security vulnerabilities in its License Center application that could allow attackers to access sensitive information or disrupt services on affected NAS devices….

OpenAEV: Open-source adversarial exposure validation platform
05
Jan
2026

OpenAEV: Open-source adversarial exposure validation platform

OpenAEV is an open source platform designed to plan, run, and review cyber adversary simulation campaigns used by security teams….

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network
05
Jan
2026

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network

Resecurity deploys synthetic data honeypots to outsmart threat actors, turning reconnaissance into actionable intelligence. A recent operation not only trapped…

Print Friendly, PDF & Email
05
Jan
2026

Doctoring Documents: Mistruth in History and Cybersecurity

In this interview, we dive into Doctoring Documents: Mistruth in History and Cybersecurity, exploring how misinformation has evolved from ancient…

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol
05
Jan
2026

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol – Hackread – Cybersecurity News, Data Breaches, AI, and More

A self-described security researcher operating under the pseudonym Martha Root has breached and exposed thousands of user profiles from a…

Exclusive | HKMA in talks with SFC, Insurance Authority to promote fintech over next 5 years
05
Jan
2026

Exclusive | HKMA in talks with SFC, Insurance Authority to promote fintech over next 5 years

Under the five-year plan called Fintech 2030 that starts this year, the HKMA would expand the scope of the city’s…

Resecurity Caught ShinyHunters in Honeypot
04
Jan
2026

Resecurity Caught ShinyHunters in Honeypot

Resecurity Caught ShinyHunters in Honeypot Pierluigi Paganini January 04, 2026 Resecurity caught ShinyHunters (SLH) using decoy accounts; the group attacked airlines,…