Search
1000 results for “Hackread”
-
⚠️ Alert: A #WebXR flaw (CVE-2025-12443) affected Chrome, Edge, Brave, Opera and other Chromium browsers - over 4 billion devices at risk. Patch pushed - update your browser now! 🔐
Read: https://hackread.com/webxr-flaw-chromium-users-browser-update/
-
⚠️ Alert: A #WebXR flaw (CVE-2025-12443) affected Chrome, Edge, Brave, Opera and other Chromium browsers - over 4 billion devices at risk. Patch pushed - update your browser now! 🔐
Read: https://hackread.com/webxr-flaw-chromium-users-browser-update/
-
⚠️ Alert: A #WebXR flaw (CVE-2025-12443) affected Chrome, Edge, Brave, Opera and other Chromium browsers - over 4 billion devices at risk. Patch pushed - update your browser now! 🔐
Read: https://hackread.com/webxr-flaw-chromium-users-browser-update/
-
⚠️ Alert: A #WebXR flaw (CVE-2025-12443) affected Chrome, Edge, Brave, Opera and other Chromium browsers - over 4 billion devices at risk. Patch pushed - update your browser now! 🔐
Read: https://hackread.com/webxr-flaw-chromium-users-browser-update/
-
AgentSmith flaw in LangSmith’s Prompt Hub exposed user API keys and data via malicious AI agents using hidden proxies, researchers reveal.
🔗 https://hackread.com/agentsmith-flaw-langsmith-prompt-hub-api-keys-data/
-
⚠️ New #ClickFix malware campaign is tricking users with a fake browser “fix” prompt that leads to #DarkGate being installed via clipboard PowerShell commands. 📋
Read: https://hackread.com/clickfix-attack-fake-browser-install-darkgate-malware/
-
Researchers reveal the MAESTRO toolkit used to exploit VMware VM escape vulnerabilities, showing how attackers broke out of virtual machines and targeted ESXi servers.
Read: https://hackread.com/maestro-toolkit-vmware-vm-escape-vulnerabilities/
-
NEW: The mysterious #RedCurl group, known for targeting the US, Russia and Western Europe, is now deploying new #QWCrypt ransomware in hypervisor attacks.
Read: https://hackread.com/redcurl-uses-qwcrypt-ransomware-hypervisor-attacks/
-
Researchers from Google and GitGuardian found over 900 TLS certificates used by Fortune 500 firms and governments exposed through leaked private keys on public code platforms like #GitHub.
Read: https://hackread.com/certificates-fortune-500-gov-exposed-key-leaks/
-
🚨 New Cybercrime Tactic Alert: Infrastructure Laundering: Cybercriminals are exploiting cloud services like AWS & Azure to fuel phishing, scams, & money laundering. The #FUNNULL CDN is abusing IP rentals for large-scale fraud.
Read: https://hackread.com/funnull-aws-azure-abused-global-cybercrime-operations/
-
NEW: HellCat ransomware hits 4 companies across the US and Europe by exploiting Jira credentials stolen through infostealer malware.
Read: https://hackread.com/hellcat-ransomware-firms-infostealer-stolen-jira-credentials/
-
📢⚠️🏳️🌈🪝A Pride Month themed phishing campaign targets employees worldwide, abusing trusted email services like #SendGrid and using techniques similar to Scattered Spider, CryptoChameleon, and PoisonSeed.
Read: https://hackread.com/pride-month-phishing-employees-trusted-email-services/
-
🚨 Alert: The new #EternidadeStealer is using WhatsApp to spread malicious files to steal banking and crypto data from users. Watch out and don’t open unexpected attachments, plus verify messages from contacts.
Read: https://hackread.com/eternidade-stealer-whatsapp-steal-banking-data/
-
📢⚠️🩹 #Cisco has patched 48 vulnerabilities in its Secure Firewall products, including 2 critical CVSS 10 flaws that could allow authentication bypass and remote code execution with root access - Patch NOW!
Read: https://hackread.com/cisco-patches-firewall-vulnerabilities-cvss-10-flaws/
-
🚨 Fortinet has released patches for two actively exploited vulnerabilities in its #FortiWeb web-application firewalls. One allows full takeover, the other enables command injection.
Update now: https://hackread.com/fortinet-fixes-fortiweb-takeover-flaw-active-attacks/
-
🚨 Urgent patch alert: a 9.9/10 severity flaw (CVE-2025-42887) in #SAP Solution Manager allows code injection and full system takeover. Act now.
Read: https://hackread.com/sap-patch-cve-2025-42887-takeover-vulnerability/
-
⚠️ Chinese hackers hit governments, media, and cybersecurity firms in a global cyber espionage spree. Over 70 orgs targeted using tools like ShadowPad and PurpleHaze.
Read: https://hackread.com/chinese-linked-hackers-targeted-global-organizations/
#CyberSecurity #China #CyberAttack #PurpleHaze #ShadowPad #APT15
-
⚠️ Critical #XSS flaw actively exploited in Zimbra Collaboration Suite, putting over 129,000 servers at risk. Researchers suspect involvement of #Sednit (aka Fancy Bear).
Read: https://hackread.com/zimbra-cve-2024-27443-xss-flaw-hit-sednit-servers/
-
New and Just In: Space Bears ransomware claims it stole internal Comcast files via a breach at contractor Quasar, Inc. as the group's dark web leak site lists both as victims.
Read: https://hackread.com/space-bears-ransomware-comcast-quasar-breach/
-
📢⚠️ Private chats, photos, and phone screengrabs of celebrities and influencers exposed after a suspected stalkerware setup left a database open. Over 86K files leaked.
Read: https://hackread.com/private-chats-photos-celebs-expose-stalkerware-leak/
#CyberSecurity #Privacy #Stalkerware #CyberCrime #DataBreach
-
Bryan Fleming, creator of pcTattletale, just pleaded guilty in US federal court for selling illegal stalkerware that let users secretly spy on phones and computers.
Read: https://hackread.com/pctattletale-stalkerware-founder-bryan-fleming-guilty/
#pcTattletale #Stalkerware #Cybercrime #Privacy #BryanFleming
-
⚠️ The #SilverFox APT is exploiting a Microsoft‑signed but vulnerable driver to disable Windows security on Win 10/11 and install #ValleyRAT malware.
Details: https://hackread.com/silver-fox-apt-exploit-signed-windows-driver-valleyrat/
-
📢⚠️ US-Estonian suspect Peter Stokes was arrested in #Finland over alleged ties to Scattered Spider, facing US charges for cyberattacks, fraud, and data breaches.
Read: https://hackread.com/us-estonian-suspect-arrest-scattered-spider-cyberattacks/
-
📢⚠️ Hackers are abusing hijacked Google Ads and fake Claude AI guides in a new #ClickFix attack targeting Mac users. Victims are tricked into pasting malicious Terminal commands that install #MacSync infostealer malware.
Read more: https://hackread.com/google-ads-claude-ai-macsync-malware-clickfix/
-
📢⚠️🚫 Poland blocks wiper malware attack from Russian #APT44 on power and heating plants, stopping major energy disruption.
https://hackread.com/poland-thwarts-russian-wiper-malware-power-plants/
-
🔐 🖥️ 🌐 🛡️ Russian state-sponsored hackers are moving away from security vulnerabilities and breaking into critical infrastructure through misconfigured devices, warns Amazon Threat Intelligence. ⚠️ 🏭 🔍
Read: https://hackread.com/amazon-russia-gru-hackers-misconfigured-vulnerabilities/
-
Watch out as the new #RedTiger infostealer is targeting gamers on Discord, stealing tokens, payment details, browser credentials and even webcam images.
Read: https://hackread.com/redtiger-malware-discord-tokens-webcam-images/
-
📢⚠️ Watch out as Phantom malware is hiding in modded Android games, turning phones into silent ad fraud bots. If you're sideloading apps, you're a target.
Read: https://hackread.com/phantom-malware-android-game-mods-ad-fraud/
-
⚠️ New twist in Android malware: New version of #GodFather banking trojan runs real banking apps in a sandbox to steal your data in real time. It looks like the real app because it is the real app, just hijacked.
Read: https://hackread.com/godfather-android-malware-apps-sandbox-steal-data/
-
Iranian TV transmission was hacked to broadcast protest footage and a message from exiled Prince Reza Pahlavi urging security forces not to fire on civilians 📺
Read: https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
#CyberSecurity #Iran #RezaPahlavi #IranProtest #Badr #Satellite