The official website of United States Department of Agriculture (USDA) http://www.usda.gov/fundinglapse.htm has been shutdown until further notice by the United Stated Government....
Logging into public Wi-Fi hotspots can be risky, particularly for business users with sensitive data on their devices - but a new...
An Israeli security researcher has found another way round Apple’s Fingerprint ID security system - this time via a two-step lock-screen glitch...
Some of the US officials of the Navy have stated that some hackers from Iran have penetrated into the unclassified computer networks...
Britain Military Going Cyber- Warriors: MoD to hire hundreds of Cyber Geniuses and IT Professionals for their Military Cyber Units. Britain’s ministry...
Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned - and all it takes is one lucky strike...
Two Pakistani hackers going with the handle of Dr@cul@ and Muhammad Bilal have hacked and defaced twenty thousand (20,000) Indian websites against...
A new declassified document of NSA reveals that the agency spied communications of Muhammad Ali, Art Buchwald and MLK. During the midst...
One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen - or...
Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks - with a British...
An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis...
The following report was taking from an independent news source, original report is available @ National Report. We at HackRead do not...
Since Senator. Al- Franken has become of part of the United States Senate, he has been the Chairman of Senate Judiciary Subcommittee...
There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of...
Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these...
Yesterday I updated you with NYPD’s activity where it was found running a campaign, asking users to upgrade their iPhone and iPads to...
Among the list of those countries which are considered a top target by the NSA‘s surveillance program, India has been up there...
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own...
Android users will now be able to remotely add a password to a lost device, even if it's locked, or already being...
We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right...
Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years
New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Bogus npm Packages Used to Trick Software Developers into Installing Malware
New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Network Threats: A Step-by-Step Attack Demonstration
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft