Starlink sends piracy warnings to users urging them to avoid downloading any illegal content by using their service. If you are one...
Dubbed WifiDemon by researchers; the attack required the victim’s wifi to be set on auto-join which is by default in iPhones. Just...
The US government is also offering $10 million in rewards for information on foreign hackers involved in ransomware attacks on the United...
The trove of data was left exposed unencrypted and without any password or security authentication. The team of IT security researchers at...
“Surveilling the Gamers: Privacy Impacts of the Video Game Industry,” a new research reveals how personal and financial data collected by gaming...
If you are using Kaspersky Password Manager (KPM) for creating passwords, you might want to consider regenerating those you created before October...
GETTR, a pro-Trump social media platform, has been attacked twice since its launch on July 4th, 2021. GETTR is a Twitter-inspired social...
Usually, hackers utilize weaponized MS Office documents or other social engineering tactics in malspam campaigns to trap unsuspecting users and let them...
In the latest LinkedIn phishing scam, the sender’s email address appears to be from Paul University which is based in Nigeria. Phishing...
Microsoft is urging customers to “install these updates immediately.” Last week, the IT security researchers at Sangfor revealed a critical 0-day vulnerability...
A 21-year-old US citizen named John Binns has claimed responsibility for the T-Mobile data breach and labeled the carrier’s “security is awful.”...
The accused is a Greek national who used AlphaBay marketplace with the alias “The Bull” on the dark web for insider trading...
According to New Skills Academy’s data breach notification email seen by Hackread.com, the number of victims impacted by the breach is yet...
In recent news, people are shocked to find out all of their data stored on their Western Digital My Book Live hard...
The group of hackers behind the cyberattack on the Iranian prison goes by the name of Edaalate Ali – The footage shows...
Microsoft acknowledged the incident and currently investigating the issue but at the same time downplaying its impact. In recent news, it has...
According to researchers, the PRISM backdoor has been on their radar for more than 3.5 years. Security researchers at AT&T Labs have...
LinkedIn has not suffered data breach but the records being sold are collected through data scraping technique. Two months back, Hackread.com exclusively...
Reportedly, Revil ransomware is demanding $5 million in ransom. Not many ransomware gangs survive long enough to victimize one company after another...
Cybersecurity researchers at Berlin-based infosec company Positive Security have identified two serious zero-day vulnerabilities impacting Pling-based FOSS (free and open-source software) marketplaces...
The vulnerability would allow threat actors to remotely compromise a targeted ThroughTek IoT device and watch the real-time video feed, listen to...