Search
954 results for “Hackread”
-
Hackers are using fake job interview apps to spread new #JobStealer malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.
Read more: https://hackread.com/fake-job-interview-jobstealer-malware-windows-macos/
-
Hackers are using fake job interview apps to spread new #JobStealer malware across macOS and Windows systems, stealing crypto, browser credentials, and more disguising itself as a video meeting app.
Read more: https://hackread.com/fake-job-interview-jobstealer-malware-windows-macos/
-
📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.
Read: https://hackread.com/famoussparrow-oil-gas-ms-exchange-server-exploit/
-
📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.
Read: https://hackread.com/famoussparrow-oil-gas-ms-exchange-server-exploit/
-
📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.
Read: https://hackread.com/famoussparrow-oil-gas-ms-exchange-server-exploit/
-
📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.
Read: https://hackread.com/famoussparrow-oil-gas-ms-exchange-server-exploit/
-
📢⚠️ China-linked #FamousSparrow hacking group targeted an oil and gas firm in #Azerbaijan using the ProxyNotShell exploit chain alongside Deed RAT and Terndoor malware across three persistent attack waves.
Read: https://hackread.com/famoussparrow-oil-gas-ms-exchange-server-exploit/
-
📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.
Read: https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/
-
📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.
Read: https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/
-
📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.
Read: https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/
-
📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.
Read: https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/
-
📢⚠️ A new China-linked #TwillTyphoon hacking group is using fake Apple and Yahoo domains along with trusted #Windows tools to spy on organizations across Japan and the Asia-Pacific region.
Read: https://hackread.com/chinatwill-typhoon-fake-apple-yahoo-sites-espionage/
-
📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.
Read: https://hackread.com/teampcp-mistral-ai-repositories-mini-shai-hulud-attack/
-
📢⚠️ A #TeamPCP-linked account claims to be selling alleged internal Mistral AI repositories days after the Mini Shai-Hulud supply chain attacks targeted npm and PyPI packages linked to the AI company.
Read: https://hackread.com/teampcp-mistral-ai-repositories-mini-shai-hulud-attack/
-
Instructure has reached an agreement with the #ShinyHunters group to return and destroy stolen Canvas data, protecting millions of student records worldwide from being publicly leaked.
Read: https://hackread.com/instructure-shinyhunters-deal-prevent-canvas-data-leak/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
Research reveals that #TeamPCP hijacked OIDC tokens to poison hundreds of TanStack, Mistral AI, and UiPath packages with the self-propagating Mini Shai-Hulud worm.
Read: https://hackread.com/teampcp-mini-shai-hulud-worm-npm-pypi-packages/
-
📢⚠️ A Slovakian administrator tied to the dark web Kingdom Market received a 16-year US prison sentence for drug trafficking and cybercrime activity.
Read: https://hackread.com/slovakian-admin-dark-web-kingdom-market-us-jail/
#CyberSecurity #CyberCrime #DarkWeb #KingdomMarket #Slovakia
-
📢⚠️ #ShinyHunters hackers say their official clearnet domain has been suspended after the Canvas LMS attacks, forcing the group to move fully to its onion site.
Read: https://hackread.com/canvas-hackers-shinyhunters-official-domain-suspended/
-
Watch out: An undocumented malware campaign is targeting developers with fake Claude Code installers that steal browser passwords, cookies, and encrypted credentials.
Read: https://hackread.com/fake-claude-code-installer-devs-browser-credential-stealer/
-
📢⚠️ Hackers are using fake aid documents to spread Operation #HumanitarianBait, a #Python spyware campaign that steals browser logins, Telegram sessions, crypto keys, and installs remote access tools via GitHub Releases.
Read: https://hackread.com/operation-humanitarianbait-fake-aid-docs-python-spyware/
-
📢⚠️ Hackers are now using #AI to develop zero-day exploits, according to a new Google report. Researchers also uncovered AI-powered #Android backdoors, phishing scams and automated supply chain attacks targeting GitHub and PyPI.
Read: https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
📢⚠️ Hackers are now using #AI to develop zero-day exploits, according to a new Google report. Researchers also uncovered AI-powered #Android backdoors, phishing scams and automated supply chain attacks targeting GitHub and PyPI.
Read: https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
📢⚠️ Hackers are now using #AI to develop zero-day exploits, according to a new Google report. Researchers also uncovered AI-powered #Android backdoors, phishing scams and automated supply chain attacks targeting GitHub and PyPI.
Read: https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
📢⚠️ Hackers are now using #AI to develop zero-day exploits, according to a new Google report. Researchers also uncovered AI-powered #Android backdoors, phishing scams and automated supply chain attacks targeting GitHub and PyPI.
Read: https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
📢⚠️ Hackers are now using #AI to develop zero-day exploits, according to a new Google report. Researchers also uncovered AI-powered #Android backdoors, phishing scams and automated supply chain attacks targeting GitHub and PyPI.
Read: https://hackread.com/google-hackers-used-ai-develop-zero-day-exploit/
-
📢🪝⚠️ A Romanian national accused of running #VOIP vishing scams and using fake debit cards to drain bank accounts now faces up to 30 years in a US prison after extradition from #Romania.
Read: https://hackread.com/romanian-man-30-years-us-prison-vishing-scams/