Anonymous hackers breached a South African job portal which hosts job fair for the locals — However, Anonymous decided to leak the...
Breach comes a year after a previous hack compromised 300,000 people. The US Internal Revenue Service was the target of a malware attack...
Short Bytes: Remember the white hat hackers — The White Team — responsible for creating the Linux.Wifatch malware last October? The same hackers...
Short Bytes: Third party app stores cannot always guarantee the user safety with each app they hand out to a user. On...
A password reset flaw allowed hacker to hijack numerous Twitter accounts from their original owners. Twitter followers of @god, @emoji, and @vagina were...
If you are following HackRead you must be aware of what is bug bounty and how it works but did you know...
Short Bytes: Nativefier is based on the Node.js runtime environment which can convert any web page into an automated desktop application. Nativefier does this...
The UK's Intelligence and Security Committee has deemed the latest Draft Investigatory Powers Bill as a “missed opportunity”, according to its latest...
The Online Hacktivist Anonymous Demands Exclusion of Saudi Arabia from Olympics for Battering Human Rights Saudi Arabia has always been criticized by...
Short Bytes: As a part the latest Patch Tuesday, Microsoft released 13 security patches for all version of Windows and other software like...
Attackers have disguised information-stealing and Bitcoin malware as third-party add-ons and cheats for Blizzard’s online card game. Hearthstone, a free-to-play card game...
TENERIFE, SPAIN—THERE ARE many ways we know of to cause a blackout. You could hack industrial equipment to spin a generator out...
Home routers with little to no security are far too common. They’re dangerous from a number of perspectives: as peeping holes for spying on people’s...
Security experts at Kaspersky have spotted in the wild a new variant of AlienSpy RAT Family openly offered with a model of...
Apps that use 3rd-party updater over insecure HTTP channels subject to MiTM attacks. Camtasia, uTorrent, and a large number of other Mac...
Short Bytes: Your desire to master the art of Facebook hacking can harm you in a big way. Recently, a variant of Remtasu...
French privacy advocates tell Facebook to stop spying on its citizen within 3 month It’s a fact that European countries are not...
Short Bytes: Pluralsight has one of the biggest collections of programming video courses. Here’s a simple way that tells you how to...
Short Bytes: In the war between good versus evil, ”Good’ makes more money than ‘Bad’ even if ‘Bad’ is good at finding the...
A group of hackers famously known as New World Hackers (NWH) is claiming to attack a number of state websites in North...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Eternal Malware: CVE-2024-3400 Rootkits Persist Through Palo Alto Firewalls Updates and Resets
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage