Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks
19
Jan
2026

Livewire Filemanager Vulnerability Exposes Web Applications to RCE Attacks

A significant security vulnerability has been discovered in Livewire Filemanager, a widely used file management component embedded in Laravel web…

Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials
19
Jan
2026

Remcos RAT Campaign Uses Trojanized VeraCrypt Installers to Steal Credentials

AhnLab Security Intelligence Center (ASEC) has identified an active Remcos RAT campaign targeting users in South Korea. The malware is…

Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
19
Jan
2026

Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites – Hackread – Cybersecurity News, Data Breaches, AI, and More

AI assistants are built to make life easier, but a new discovery shows that even a simple meeting invite can…

Women In Cybersecurity Report, Winter 2025
19
Jan
2026

The Queen Of The Hackers Tracked Down By U.S. Secret Service

On Aug. 17, 1990, a federal judge sentenced a Chicago woman to 27 months in prison for masterminding a nationwide ring…

sleeper browser extensions for three popular browsers
19
Jan
2026

Firefox joins Chrome and Edge as sleeper extensions spy on users

A group of cybercriminals called DarkSpectre is believed to be behind three campaigns spread by malicious browser extensions: ShadyPanda, GhostPoster,…

New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs
19
Jan
2026

New StackWarp Hardware Flaw Breaks AMD SEV-SNP Protections on Zen 1–5 CPUs

Ravie LakshmananJan 19, 2026Hardware Security / Vulnerability A team of academics from the CISPA Helmholtz Center for Information Security in…

Free Converter Apps that Convert your Clean System to Infected in Seconds
19
Jan
2026

Free Converter Apps that Convert your Clean System to Infected in Seconds

Malicious file converter applications distributed through deceptive advertisements are infecting thousands of systems with persistent remote access trojans (RATs). These…

The Hidden Backbone of a Ransomware Operation
19
Jan
2026

The Hidden Backbone of a Ransomware Operation

The leaks tied to the BlackBasta ransomware group and Russian hosting company Media Land pulled back the curtain on something…

The High (and Hidden) Costs for Cloud-First Businesses
19
Jan
2026

The High (and Hidden) Costs for Cloud-First Businesses

Just a few years ago, the cloud was touted as the “magic pill” for any cyber threat or performance issue….

report-ad-banner
19
Jan
2026

How To Delete Saved Passwords In Google Chrome Securely

It usually starts with a small convenience. You log into a site once, Chrome offers to remember the password, and…

Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack
19
Jan
2026

Ukraine Police Exposed Russian Hacker Group Specializes in Ransomware Attack

Ukrainian and German law enforcement have disrupted a Russian‑affiliated hacker group that has been carrying out high‑impact ransomware attacks against…

Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor
19
Jan
2026

Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoor – Hackread – Cybersecurity News, Data Breaches, AI, and More

A new cybersecurity threat has been discovered that exploits a common office tool to create a backdoor. The malware, known…