Cybersecurity threats are unpredictable but taking a closer look at them and implementing proper security measures seems like a wise decision. The...
Microsoft has disclosed that the SolarWinds hackers or SolarWinds supply chain attack-fame threat actors are back in action. This time, they are targeting...
Cybersecurity researchers from FireEye unmasked additional tactics, techniques, and procedures (TTPs) adopted by Chinese threat actors who were recently found abusing Pulse...
Kirill Victorovich Firsov, a Russian Citizen has been jailed for 30 months (2.5 years) in US prison for running popular cybercrime marketplace...
The cyberattack actually occurred back in 2016 and 2017 when an individual installed malware on multiple computers of a retail chain, headquartered...
Cybersecurity researchers on Wednesday publicized the disruption of a “clever” malvertising network targeting AnyDesk that delivered a weaponized installer of the remote...
Hackread.com can confirm that threat actors on several hacker forums are already hunting for stolen Omiai database. In recent news, Japan’s biggest...
Bose reveals it suffered “a sophisticated cyber-attack that disrupted some of its systems” in the United States. Ransomware attacks are the new...
According to SentinelOne, Iranian hackers have developed a combo of disk wiper and ransomware and their target is Israeli cyberinfrastructure. The Agrius...
VMware has rolled out patches to address a critical security vulnerability in vCenter Server that could be leveraged by an adversary to...
Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an...
Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an...
Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out...
Adversaries could exploit newly discovered security weaknesses in Bluetooth Core and Mesh Profile Specifications to masquerade as legitimate devices and carry out...
State-sponsored hackers affiliated with North Korea have been behind a slew of attacks on cryptocurrency exchanges over the past three years, new...
State-sponsored hackers affiliated with North Korea have been behind a slew of attacks on cryptocurrency exchanges over the past three years, new...
The adversary behind Conti ransomware targeted no fewer than 16 healthcare and first responder networks in the U.S. within the past year,...
India’s flag carrier airline, Air India, has disclosed a data breach affecting 4.5 million of its customers over a period stretching nearly...
U.S. insurance giant CNA Financial reportedly paid $40 million to a ransomware gang to recover access to its systems following an attack...
Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the...
Cybersecurity researchers have uncovered an ongoing malware campaign that heavily relies on AutoHotkey (AHK) scripting language to deliver multiple remote access trojans...