Search
1000 results for “Hackread”
-
📢🪙 #Bithumb, one of the largest Bitcoin exchanges in South Korea, accidentally sent 620,000 Bitcoin (about $40 Billion) to customer accounts during a promo.
Read: https://hackread.com/bithumb-sends-bitcoin-to-customer-accounts/
-
📢⚠️ UNC6692 hackers exploit #MicrosoftTeams with fake IT alerts to deploy SNOW malware, steal credentials, and breach corporate networks in advanced attacks.
Read: https://hackread.com/unc6692-hackers-microsoft-teams-snow-malware/
-
Hackread: Over 70 Domains Used in Months-Long Phishing Spree Against US Universities. “Anew report from security firm Infoblox reveals that at least 18 American universities have been hit by a prolonged, coordinated phishing attack over a period of many months.”
-
📢⚠️ #ShinyHunters has leaked data linked to Udemy, Zara, and 7-Eleven, with claims of exposed Salesforce records and cloud-based systems.
Read: https://hackread.com/shinyhunters-leak-udemy-zara-7-eleven-data-breach/
-
#BlueShield healthcare insurance provider exposed info of 4.7 million members to Google for years due to a misconfigured #GoogleAnalytics setup - A huge privacy failure.
Read: https://hackread.com/blue-shield-leaked-millions-patient-info-google-years/
-
📢⚠️ Researchers warn that #VECT 2.0 ransomware contains fatal flaws that permanently destroy files, making recovery impossible and rendering ransom payments useless for victims worldwide.
https://hackread.com/paying-ransom-vect-2-0-ransomware-destroys-data/
-
📢🪝Watch out as scammers are cloning Avast’s website to push fake €499 charges and steal credit card details using urgency tricks, live chat, and realistic payment checks.
#CyberSecurity #Phishing #Scam #Avast #Malware
Read: https://hackread.com/fake-avast-website-phishing-refund-scam/
-
🚨 New "Model Namespace Reuse" lets attackers hijack trusted AI models on platforms like #VertexAI and #AzureAI by registering deleted names and inserting malicious versions via #HuggingFace.
Read: https://hackread.com/model-namespace-reuse-flaw-ai-models-google-microsoft/
-
Russian BlueDelta (Fancy Bear) uses PDFs to steal logins in just 2 seconds, targeting energy and research professionals globally.
Read: https://hackread.com/russian-bluedelta-fancy-bear-pdfs-steal-login/
-
Massive outage at #Cloudflare hits dozens of major sites - slow load times, login issues and dashboard errors despite services showing as restored.
Read: https://hackread.com/cloudflare-outage-jolts-internet-who-was-hit/
-
Coupang CEO Park Dae jun resigns after a data breach exposed records linked to 33.7 million customer accounts. Police raids, regulatory action, and lawsuits follow as scrutiny over security failures intensifies.
Read: https://hackread.com/coupang-ceo-steps-down-data-breach/
-
Coupang, South Korea’s equivalent of Amazon, confirms a massive data breach affecting nearly 34 million customers - about 65.2 % of the population.
Read: https://hackread.com/coupang-data-breach-south-korean-accounts/
-
🚨 #CISA warns CVE-2025-3248 in Langflow is being actively exploited. Critical RCE flaw allows full server takeover. Patch to v1.3.0 ASAP.
#Infosec #CVE2025 #Langflow #CyberSecurity
Read: https://hackread.com/langflow-vulnerability-cve-2025-3248-actively-exploited-cisa/
-
📢⚠️ Fake CAPTCHA ClickFix campaign tricks users into running malicious commands, abusing native Windows tools to avoid detection.
Read: https://hackread.com/clickfix-variant-native-windows-tools-bypass-security/
-
That “I’m not a robot” click could drain your crypto. A new ClickFix attack uses #Node.js malware and Tor to quietly take over Windows systems and steal wallets, all triggered by a fake CAPTCHA.
Read: https://hackread.com/clickfix-attack-node-js-malware-tor-steal-crypto/
-
Dutch teens arrested on suspicion of spying for pro-Russian hackers, allegedly using a Wi-Fi sniffer device and recruited via Telegram.
Read: https://hackread.com/dutch-teens-arrested-spying-pro-russian-hackers/
#Espionage #Russia #CyberSecurity #YouthCrime #InfoSec #CyberCrime
-
#DoNot, an APT linked to India, hits a European foreign affairs ministry with fake diplomacy-themed emails and new malware called #LoptikMod.
Read: https://hackread.com/donot-apt-hits-european-ministry-loptikmod-malware/
-
Iranian TV transmission was hacked to broadcast protest footage and a message from exiled Prince Reza Pahlavi urging security forces not to fire on civilians 📺
Read: https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
#CyberSecurity #Iran #RezaPahlavi #IranProtest #Badr #Satellite
-
Iranian TV transmission was hacked to broadcast protest footage and a message from exiled Prince Reza Pahlavi urging security forces not to fire on civilians 📺
Read: https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
#CyberSecurity #Iran #RezaPahlavi #IranProtest #Badr #Satellite
-
Iranian TV transmission was hacked to broadcast protest footage and a message from exiled Prince Reza Pahlavi urging security forces not to fire on civilians 📺
Read: https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
#CyberSecurity #Iran #RezaPahlavi #IranProtest #Badr #Satellite
-
Iranian TV transmission was hacked to broadcast protest footage and a message from exiled Prince Reza Pahlavi urging security forces not to fire on civilians 📺
Read: https://hackread.com/iranian-tv-transmission-hacked-exiled-prince-message/
#CyberSecurity #Iran #RezaPahlavi #IranProtest #Badr #Satellite
-
LayerX says it received no clear response after it flagged a serious Claude Code flaw to Anthropic that bypasses safety rules via the CLAUDE.md file, letting attackers run SQL injection and steal credentials using simple instructions.
Read: https://hackread.com/claude-code-claude-md-sql-injection-attacks/
-
🚨 Chinese APT group ‘TheWizards’ is exploiting IPv6 spoofing with a new tool called #Spellbinder to drop the WizardNet backdoor via hijacked software updates.
Read: https://hackread.com/chinese-thewizards-exploits-ipv6-wizardnet-backdoor/
-
🚨 Chinese APT group ‘TheWizards’ is exploiting IPv6 spoofing with a new tool called #Spellbinder to drop the WizardNet backdoor via hijacked software updates.
Read: https://hackread.com/chinese-thewizards-exploits-ipv6-wizardnet-backdoor/
-
🚨 Chinese APT group ‘TheWizards’ is exploiting IPv6 spoofing with a new tool called #Spellbinder to drop the WizardNet backdoor via hijacked software updates.
Read: https://hackread.com/chinese-thewizards-exploits-ipv6-wizardnet-backdoor/
-
🚨 Chinese APT group ‘TheWizards’ is exploiting IPv6 spoofing with a new tool called #Spellbinder to drop the WizardNet backdoor via hijacked software updates.
Read: https://hackread.com/chinese-thewizards-exploits-ipv6-wizardnet-backdoor/
-
🚨 Chinese APT group ‘TheWizards’ is exploiting IPv6 spoofing with a new tool called #Spellbinder to drop the WizardNet backdoor via hijacked software updates.
Read: https://hackread.com/chinese-thewizards-exploits-ipv6-wizardnet-backdoor/
-
New malware called #DripDropper attacks Linux servers by exploiting an ActiveMQ vulnerability, then patches that vulnerability to lock out rival cybercriminals.
Read: https://hackread.com/dripdropper-malware-exploits-linux-flaw-patche-lock-out/
-
FBI seizes domains tied to network selling fake US ID templates online. Bangladesh-based operator made $2.9M from over 1,400 buyers.
Read: https://hackread.com/fbi-seizes-domains-us-id-templates-bangladesh/
-
NEW: Everest ransomware group claims to have stolen 1 TB+ of Chrysler data, including #Salesforce and recall info, and may release more if demands aren’t met.
Read: https://hackread.com/everest-ransomware-group-chrysler-data-breach/