The FBI has arrested a 29 year old man in San Francisco, California for allegedly owning and running an underground anonymous marketplace...
The Slovakia based IT Security company ESAT has confirmed that their domains designated as distributors for Israel and Palestine were hacked yesterday....
The official websites of NASA (http://www.nasa.gov) and National Park ()have been shutdown until further notice by the United Stated Government. It is...
Facebook Will Send Conversation Data To Select TV Networks. According to a recent report in the Wall Street Journal, social networking website...
The hardcore supporters of President Bashar Ul Assad from Syrian Electronic Army (SEA) have hacked the official website of U.S. based online news...
John McAfee who is the founder of McAfee anti-virus has told that he will unveil a gadget that would enable internet users...
The online hacktivist going with the handle of AnonGhost has hacked and defaced a website belonging to an Israel based Defense Contractor ISPRA...
The official website of United States Department of Agriculture (USDA) http://www.usda.gov/fundinglapse.htm has been shutdown until further notice by the United Stated Government....
Logging into public Wi-Fi hotspots can be risky, particularly for business users with sensitive data on their devices - but a new...
An Israeli security researcher has found another way round Apple’s Fingerprint ID security system - this time via a two-step lock-screen glitch...
Some of the US officials of the Navy have stated that some hackers from Iran have penetrated into the unclassified computer networks...
Britain Military Going Cyber- Warriors: MoD to hire hundreds of Cyber Geniuses and IT Professionals for their Military Cyber Units. Britain’s ministry...
Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned - and all it takes is one lucky strike...
Two Pakistani hackers going with the handle of Dr@cul@ and Muhammad Bilal have hacked and defaced twenty thousand (20,000) Indian websites against...
A new declassified document of NSA reveals that the agency spied communications of Muhammad Ali, Art Buchwald and MLK. During the midst...
One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen - or...
Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks - with a British...
An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis...
The following report was taking from an independent news source, original report is available @ National Report. We at HackRead do not...
Since Senator. Al- Franken has become of part of the United States Senate, he has been the Chairman of Senate Judiciary Subcommittee...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials
Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks