Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer
12
Dec
2025

Google ads funnel Mac users to poisoned AI chats that spread the AMOS infostealer

Researchers have found evidence that AI conversations were inserted in Google search results to mislead macOS users into installing the…

University of York plumps for Workday to spruce up HR and finance
12
Dec
2025

University of York plumps for Workday to spruce up HR and finance

York University has chosen HR and finance systems software-as-a-service supplier Workday to replace more than 30 HR and finance applications,…

Researchers Revive 2000s 'Blinkenlights' Technique to Dump Smartwatch Firmware via Screen Pixels
12
Dec
2025

Researchers Revive 2000s ‘Blinkenlights’ Technique to Dump Smartwatch Firmware via Screen Pixels

Security researchers have successfully extracted firmware from a budget smartwatch by bringing back a 20-year-old attack method originally used to…

What Happens Inside PDFAid in Seconds: From Upload to Download
12
Dec
2025

From Upload to Download – Hackread – Cybersecurity News, Data Breaches, AI, and More

Most people interact with PDF tools only at the surface level, such as selecting a file, clicking upload, waiting a…

Who's Patching Your Network?
12
Dec
2025

From Teen Computer Whiz To Crypto Godfather

12 Dec True Hacking Story: From Teen Computer Whiz To Crypto Godfather Posted at 09:02h in Blogs by Taylor Fox…

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
12
Dec
2025

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating…

Quantum risk to quantum readiness: A PQC roadmap
12
Dec
2025

Quantum risk to quantum readiness: A PQC roadmap

No one knows exactly when quantum computing will arrive, but accelerating progress is prompting security and IT leaders to recognise…

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users
12
Dec
2025

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users

A sophisticated phishing campaign has emerged that successfully bypasses multi-factor authentication, protecting Microsoft 365 and Okta users, representing a serious…

ImmuniWeb enhances AI vulnerability testing and compliance reporting
12
Dec
2025

ImmuniWeb enhances AI vulnerability testing and compliance reporting

ImmuniWeb has unveiled a major update to its ImmuniWeb AI Platform, based on ongoing research as well as valuable feedback…

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems
12
Dec
2025

NANOREMOTE Malware Leverages  Google Drive API for Command-and-Control (C2) to Attack Windows Systems

A sophisticated new Windows backdoor named NANOREMOTE emerged in October 2025, presenting a significant threat to enterprise environments by leveraging…

CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems
12
Dec
2025

CyberVolk Hackers Group With New VolkLocker Payloads Attacks both Linux and Windows Systems

CyberVolk, a pro-Russia hacktivist group, has reemerged with a new ransomware platform called VolkLocker following a period of dormancy in…

Interview: Erik Mayer, transformation chief clinical information officer, Imperial College
12
Dec
2025

Interview: Erik Mayer, transformation chief clinical information officer, Imperial College

Managing complex responsibilities is a common task for digital leaders. However, for Erik Mayer, transformation chief clinical information officer (CCIO)…