The official website of United States Department of Agriculture (USDA) http://www.usda.gov/fundinglapse.htm has been shutdown until further notice by the United Stated Government....
Logging into public Wi-Fi hotspots can be risky, particularly for business users with sensitive data on their devices - but a new...
An Israeli security researcher has found another way round Apple’s Fingerprint ID security system - this time via a two-step lock-screen glitch...
Some of the US officials of the Navy have stated that some hackers from Iran have penetrated into the unclassified computer networks...
Britain Military Going Cyber- Warriors: MoD to hire hundreds of Cyber Geniuses and IT Professionals for their Military Cyber Units. Britain’s ministry...
Spear-phishing attacks on energy companies are becoming increasingly sophisticated, an expert has warned - and all it takes is one lucky strike...
Two Pakistani hackers going with the handle of Dr@cul@ and Muhammad Bilal have hacked and defaced twenty thousand (20,000) Indian websites against...
A new declassified document of NSA reveals that the agency spied communications of Muhammad Ali, Art Buchwald and MLK. During the midst...
One day, your smartphone might “recognise” you by the way you walk, the way your fingers tap on a touchscreen - or...
Small businesses will be able to buy “cyber assurance” packages to protect against possible losses from cyber attacks - with a British...
An “identity theft service” which specialises in selling personal details gained access to some of the biggest consumer data firms, including Lexis...
The following report was taking from an independent news source, original report is available @ National Report. We at HackRead do not...
Since Senator. Al- Franken has become of part of the United States Senate, he has been the Chairman of Senate Judiciary Subcommittee...
There is a new bot on the block. ESET identifies it as Win32/Napolar while its author calls it solarbot. This piece of...
Yahoo! recently began recycling “inactive” user accounts, in an effort to woo new customers - but some customers who have acquired these...
Yesterday I updated you with NYPD’s activity where it was found running a campaign, asking users to upgrade their iPhone and iPads to...
Among the list of those countries which are considered a top target by the NSA‘s surveillance program, India has been up there...
Many workplaces allow wokers to bring their own smartphones, tablets and PCs to work - a practise described as "Bring Your Own...
Android users will now be able to remotely add a password to a lost device, even if it's locked, or already being...
We think that there could be rootkits targeting the OS X platform, but we have very limited visibility into that threat right...
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield
Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign
Mirai Botnet Exploits Ivanti Connect Secure Flaws for Malicious Payload Delivery
A SaaS Security Challenge: Getting Permissions All in One Place
The Fundamentals of Cloud Security Stress Testing
Hijack Loader Malware Employs Process Hollowing, UAC Bypass in Latest Version
Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites
Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator
APT42 Hackers Pose as Journalists to Harvest Credentials and Access Cloud Data
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
New Case Study: The Malicious Comment