Search
1000 results for “Hackread”
-
$15B pig butchering scam boss Chen Zhi has been extradited to #China after being tied to one of the largest forced-labour crypto fraud networks and the seizure of massive #Bitcoin holdings.
Read: https://hackread.com/pig-butchering-scam-chen-zhi-extradit-chin/
#ChenZhi #PigButchering #Crypto #Cybercrime #CyberSecurity #Cambodia
-
📢⚠️📩 Watch out for a massive #Click2SMS fraud scheme that uses fake CAPTCHA and back-button hijacking to trick victims into sending costly international text messages.
Read: https://hackread.com/fake-captcha-pages-exploit-clicks-send-texts/
-
📢⚠️ Hackers are abusing misconfigured Jenkins servers to deploy DDoS botnets targeting gaming infrastructure, including platforms linked to Valve Corporation.
Read: https://hackread.com/hackers-jenkins-ddos-botnet-gaming-servers/
-
📢🪝⚠️ A Romanian national accused of running #VOIP vishing scams and using fake debit cards to drain bank accounts now faces up to 30 years in a US prison after extradition from #Romania.
Read: https://hackread.com/romanian-man-30-years-us-prison-vishing-scams/
-
📢⚠️ Watch out for this new 11-step DHL phishing scam that uses fake OTP codes and EmailJS to harvest user credentials and device telemetry.
Read: https://hackread.com/dhl-phishing-scam-attack-chain-steal-passwords/
-
📢⚠️ #Bluekit, a new AI-powered phishing-as-a-service kit, lets attackers bypass MFA using #AiTM attacks and stolen session cookies. With 40+ fake templates and AI tools.
Read: https://hackread.com/bluekit-phishing-kit-targets-platforms-mfa-bypass-attack/
-
⚠️ Researchers identify a new SS7 encoding attack used by a surveillance vendor to bypass defenses and access mobile subscriber data.
Read: https://hackread.com/researchers-ss7-encoding-attack-surveillance-vendor/
-
7 Zip has a critical flaw with a public exploit and users must update the tool by hand since it has no built in updater.
Full details are here: https://hackread.com/7-zip-vulnerability-public-exploit-manual-update/
-
🚨 New AI threat alert: the #ShadowEscape 0-click exploit uses the Model Context Protocol (MCP) in AI assistants to harvest databases putting trillions of records at risk.
Read more: https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/
-
🚨 Over 270,000+ records from American National Insurance Company (#ANICO) leaked online, linked to the 2023 MOVEit hack. Sensitive customer & employee info exposed.
Read: https://hackread.com/american-national-insurance-company-anico-moveit-breach/
-
A Cursor AI agent wiped #PocketOS’ production database and backups in just 9 seconds after misusing a root API token, exposing serious risks in AI-driven coding and cloud setups.
Read more: https://hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
A Cursor AI agent wiped #PocketOS’ production database and backups in just 9 seconds after misusing a root API token, exposing serious risks in AI-driven coding and cloud setups.
Read more: https://hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
A Cursor AI agent wiped #PocketOS’ production database and backups in just 9 seconds after misusing a root API token, exposing serious risks in AI-driven coding and cloud setups.
Read more: https://hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
A Cursor AI agent wiped #PocketOS’ production database and backups in just 9 seconds after misusing a root API token, exposing serious risks in AI-driven coding and cloud setups.
Read more: https://hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
A Cursor AI agent wiped #PocketOS’ production database and backups in just 9 seconds after misusing a root API token, exposing serious risks in AI-driven coding and cloud setups.
Read more: https://hackread.com/cursor-ai-agent-wipes-pocketos-database-backups/
-
📢⚠️ Cursor AI IDE hit by a high-severity flaw that lets attackers execute code via hidden Git hooks in cloned repos, no clicks needed. A routine dev action can trigger a full system compromise. Patch now.
Read: https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
-
📢⚠️ Cursor AI IDE hit by a high-severity flaw that lets attackers execute code via hidden Git hooks in cloned repos, no clicks needed. A routine dev action can trigger a full system compromise. Patch now.
Read: https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
-
📢⚠️ Cursor AI IDE hit by a high-severity flaw that lets attackers execute code via hidden Git hooks in cloned repos, no clicks needed. A routine dev action can trigger a full system compromise. Patch now.
Read: https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
-
📢⚠️ Cursor AI IDE hit by a high-severity flaw that lets attackers execute code via hidden Git hooks in cloned repos, no clicks needed. A routine dev action can trigger a full system compromise. Patch now.
Read: https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
-
📢⚠️ Cursor AI IDE hit by a high-severity flaw that lets attackers execute code via hidden Git hooks in cloned repos, no clicks needed. A routine dev action can trigger a full system compromise. Patch now.
Read: https://hackread.com/cursor-ai-ide-vulnerability-code-execution-git-hooks/
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
🚨 TeamPCP hijacks Bitwarden CLI in supply chain attack, abusing GitHub Dependabot to deploy Shai-Hulud malware and steal developer secrets, poison AI coding tools.
Read: https://hackread.com/teampcp-bitwarden-cli-dependabot-shai-hulud-malware/
#CyberSecurity #TeamPCP #Malware #Bitwarden #GitHub #Dependabot
-
Watch out: An undocumented malware campaign is targeting developers with fake Claude Code installers that steal browser passwords, cookies, and encrypted credentials.
Read: https://hackread.com/fake-claude-code-installer-devs-browser-credential-stealer/
-
📢⚠️ Researchers have uncovered #ClaudeBleed, a vulnerability in Anthropic’s Claude for Chrome extension that could let hackers hijack the AI assistant, steal Google Drive files, access Gmail data, and bypass built-in security safeguards.
Read more: https://hackread.com/claudebleed-vulnerability-hackers-claude-chrome-extension/
-
Hackers are abusing the popularity of AI tools with a fake #ClaudeAI website that spreads a newly discovered backdoor called #Beagle. The campaign uses DLL sideloading, #malvertising, and trusted signed files to infect Windows systems.
Read: https://hackread.com/hackers-fake-claude-ai-site-infect-beagle-malware/
-
Watch out as new .NET AOT malware hides its code as a black box, making detection far harder while delivering Rhadamanthys infostealer and crypto miner.
Read: https://hackread.com/net-aot-malware-code-black-box-evade-detection/
-
A Linux cryptominer has been quietly spreading malware for years by hijacking legit websites with SSL certs.
🔗 https://hackread.com/linux-cryptominer-using-legit-sites-to-spread-malware/