NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)
26
Aug
2025

NetScaler ADC/Gateway zero-day exploited by attackers (CVE-2025-7775)

Three new vulnerabilities affecting (Citrix) NetScaler application delivery controller (ADC) and Gateway devices have been made public, one of which…

U.S. Supply Chain Manufacturers
26
Aug
2025

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory…

data of hundreds of thousands of customers exposed
26
Aug
2025

data of hundreds of thousands of customers exposed

Auchan discloses data breach: data of hundreds of thousands of customers exposed Pierluigi Paganini August 26, 2025 French retailer Auchan…

Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data
26
Aug
2025

Hackers Can Exploit Image Scaling in Gemini CLI, Google Assistant to Exfiltrate Sensitive Data

Hackers can weaponize hidden prompts revealed by downscaled images to trigger sensitive tool actions and achieve data exfiltration in Gemini CLI—and similar…

Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack
26
Aug
2025

Cybersecurity Wake-Up Call: Why All Businesses Must Prepare for the Inevitable Attack

Cybersecurity has emerged as a critical and ongoing battle against a dynamic and pervasive global threat. The landscape is evolving…

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V
26
Aug
2025

Microsoft Launches Tool to Migrate VMware VMs From vCenter to Hyper-V

Microsoft today announced the public preview of a new VM Conversion extension for Windows Admin Center, enabling IT administrators to migrate virtual…

Study Reveals TikTok, Alibaba, Temu Collect Extensive User Data in America
26
Aug
2025

Study Reveals TikTok, Alibaba, Temu Collect Extensive User Data in US

A new study by the data privacy firm Incogni, shared with Hackread.com, has revealed that a majority of the most-downloaded…

Exploits WordPress Sites to Spread Ransomware
26
Aug
2025

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA…

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems
26
Aug
2025

New Attack Flips a Single Bit in Neural Networks for Stealthily Backdoor on AI Systems

In August 2025, researchers at George Mason University published a groundbreaking study at the 34th USENIX Security Symposium, introducing OneFlip,…

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware
26
Aug
2025

Threat Actors Update Android Droppers to Remain Effective with Even Simple Malware

Threat actors are increasingly refining Android droppers to circumvent enhanced security measures, extending their utility beyond sophisticated banking trojans to…

AccuKnox Awarded Patent for Runtime Security of Kernel Events
26
Aug
2025

AccuKnox Awarded Patent for Runtime Security of Kernel Events

Menlo Park, United States, August 26th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Kubernetes and cloud-native security solutions, has…

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers
26
Aug
2025

WinRAR 0-Day Vulnerabilities Exploited in Wild by Hackers

The cybersecurity landscape has been significantly impacted by the discovery and active exploitation of two critical zero-day vulnerabilities in WinRAR,…