IntelBroker Hacker Claims Apple Breach, Steals Source Code for Internal Tools
19
Jun
2024

IntelBroker Hacker Claims Apple Breach, Steals Source Code for Internal Tools

The notorious IntelBroker hacker, who has previously been linked to high-profile breaches of major companies and government entities, has claimed…

19
Jun
2024

Clever macOS malware delivery campaign targets cryptocurrency users

Cryptocurrency users are being targeted with legitimate-looking but fake apps that deliver information-stealing malware instead, Recorder Future’s researchers are warning….

Malicious VPN
19
Jun
2024

Void Arachne Uses Deepfakes and AI to Deliver Malicious VPNs to Chinese Users

Jun 19, 2024NewsroomMalware / Cyber Attack Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne…

Maxicare Data Breach
19
Jun
2024

Maxicare Data Breach: Probe Launched, Impact Limited

Maxicare, one of the leading health maintenance organizations, has reported a security incident involving unauthorized access to personal information. The…

AI-Powered Browsers Detecting Zero-Day Phishing Attacks in High Accuracy
19
Jun
2024

AI-Powered Browsers Detecting Zero-Day Phishing Attacks

Researchers have developed a real-time browser extension integrated with machine learning algorithms to detect phishing websites with remarkable accuracy. This…

This Is What Would Happen if China Invaded Taiwan
19
Jun
2024

This Is What Would Happen if China Invaded Taiwan

In late March, a Taiwanese data analyst posted on social media about an odd satellite image: It appeared that the…

New Study Shows Rapid Adoption
19
Jun
2024

New Study Shows Rapid Adoption

Titania, specialists in continuous network security and compliance assurance solutions, announced the release of compelling new research that highlights a…

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers
19
Jun
2024

ShrinkLocker Uses Windows BitLocker Utility To Infect Computers

Hackers exploit the Windows BitLocker tool, as this utility offers a very powerful tool for selectively encrypting access to the…

Chinese Velvet Ant Hackers Target F5 Devices in Years-Long Espionage
19
Jun
2024

Chinese Velvet Ant Hackers Target F5 Devices in Years-Long Espionage

Cybersecurity firm Sygnia has discovered a sophisticated cyberespionage campaign allegedly linked to China. Their research shared with Hackread.com ahead of…

Post Office Horizon system investigators were blocked and threatened as they witnessed cover-up
19
Jun
2024

Post Office Horizon system investigators were blocked and threatened as they witnessed cover-up

Independent forensic accountants contracted to investigate controversial Post Office Horizon system in 2012 describe Post Office cover-ups, threats, obstruction and…

ANZ joins NAB and CBA on ConnectID
19
Jun
2024

ANZ joins NAB and CBA on ConnectID – Finance – Security

ANZ Plus customers will be able to reuse their banking identity with certain merchants and businesses via the ConnectID service….

New ARM 'TIKTAG' Attack
19
Jun
2024

Beware Of Fake Microsoft Teams Website That Installs Oyster Malware

Fake websites of authoritative and popular companies claiming to be genuine sites make users believe that the site belongs to…