The UK’s Online Safety Act, fully enacted in July 2025, mandates strict age verification for accessing certain online content to protect minors. Anyone living in… The post UK’s Online Safety Act Comes into force – and runs into problems immediately…
Category: EN
1.2 Million Healthcare Devices and Systems Found Exposed Online – Patient Records at Risk of Exposure, Latest Research from Modat
The Hague, Netherlands, 7th August 2025, CyberNewsWire This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: 1.2 Million Healthcare Devices and Systems Found Exposed Online – Patient Records at…
HTTP/1.1 Vulnerability Could Let Attackers Hijack Millions of Sites
Security researchers have unveiled a fundamental vulnerability in HTTP/1.1 that could allow attackers to hijack millions of websites, highlighting a persistent threat that has plagued web infrastructure for over six years despite ongoing mitigation efforts. PortSwigger’s latest research reveals that…
SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
SocGholish, operated by the threat actor group TA569, has solidified its role as a prominent Malware-as-a-Service (MaaS) provider, functioning as an Initial Access Broker (IAB) that sells compromised system access to various cybercriminal clients. Since its emergence around 2017-2018, this…
Nvidia Denies Presence of Backdoors, Kill Switches, or Spyware in Its Chips
Nvidia has issued a comprehensive denial regarding allegations that its graphics processing units contain backdoors, kill switches, or spyware, emphasizing that such features would fundamentally undermine global digital infrastructure and cybersecurity principles. The chipmaker’s statement comes amid growing discussions among…
New Active Directory Attack Method Bypasses Authentication to Steal Data
Security researchers have uncovered a novel attack technique that exploits weaknesses in hybrid Active Directory (AD) and Entra ID environments to bypass authentication and exfiltrate sensitive data. The method, showcased at Black Hat USA 2025 by cybersecurity expert Dirk-jan Mollema,…
HeartCrypt-Packed ‘AVKiller’ Tool Actively Deployed in Ransomware Attacks to Disable EDR
Threat actors are placing a higher priority on neutralizing endpoint detection and response (EDR) systems in order to remain stealthy in the dynamic world of multi-stage cyberattacks. Since 2022, malware sophistication has surged, with tools specifically engineered to disable EDR…
This mini projector beats more expensive models (and took 5 minutes to set up)
The Dangbei N2 mini projector fits in the palm of your hand and couldn’t be easier to set up, but there are some trade-offs for its tiny size. This article has been indexed from Latest news Read the original article:…
I switched my TV with a 4K UST projector – and it was a visual upgrade in several ways
While the Formovie Cinema Edge ultra-short-throw projector has a premium price, its impressive performance makes it a worthwhile investment. This article has been indexed from Latest news Read the original article: I switched my TV with a 4K UST projector…
5 back-to-school gadgets under $50 I recommend to every student (and how they come in handy)
My favorite back-to-school tech items are inexpensive, lightweight, and compact. This article has been indexed from Latest news Read the original article: 5 back-to-school gadgets under $50 I recommend to every student (and how they come in handy)
How CTEM Boosts Visibility and Shrinks Attack Surfaces in Hybrid and Cloud Environments
CTEM is a continuous strategy that assesses risk from an attacker’s view, helping orgs prioritize threats across cloud and hybrid environments. The attack surface has exploded. Between multi-cloud deployments, remote endpoints, SaaS platforms, shadow IT, and legacy infrastructure, the perimeter…
Over 100 Dell models exposed to critical ControlVault3 firmware bugs
ReVault flaws in Dell ControlVault3 firmware allow firmware implants and Windows login bypass on 100+ laptop models via physical access. Cisco Talos reported five vulnerabilities collectively named ReVault (tracked as CVE-2025-24311, CVE-2025-25215, CVE-2025-24922, CVE-2025-25050, and CVE-2025-24919) in Dell’s ControlVault3 firmware…
Hackers Uses Social Engineering Attack to Gain Remote Access in 300 Seconds
Threat actors successfully compromised corporate systems within just five minutes using a combination of social engineering tactics and rapid PowerShell execution. The incident, investigated by NCC Group’s Digital Forensics and Incident Response (DFIR) team, demonstrates how cybercriminals are weaponizing trusted…
Could agentic AI save us from the cybercrisis?
Many hands make light work in the SOC Sponsored feature The cyberthreat landscape is evolving fast, with highly organized bad actors launching ever more devastating and sophisticated attacks against often ill-prepared targets.… This article has been indexed from The Register…
Everything You Need to Know About the California Consumer Privacy Act (CCPA) in 2025
California Consumer Privacy Act (CCPA): CCPA and CPRA, Simplified On July 1, 2025, the California Attorney General settled with Healthline for $1.55 million, the highest CCPA-related fine to date, citing… The post Everything You Need to Know About the California…
Photos: Black Hat USA 2025
Here’s a look inside Black Hat USA 2025. The featured vendors are: Stellar Cyber, Vonahi Security, Gurucul, Check Point, HackerOne, EasyDMARC, Elastic, Google, Tines, Veracode, VioletX, Pentera, Keep Aware, Oleria, SpyCloud, Trend Micro and Picus Security. The post Photos: Black…
Top solutions to watch after Black Hat USA 2025
Black Hat USA 2025 was packed with innovation, with companies showing off tools built to get ahead of what’s coming next. From smarter offensive security to new ways of spotting attacks faster, the conference had no shortage of exciting developments.…
Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
Python is everywhere in modern software. From machine learning models to production microservices, chances are your code—and your business—depends on Python packages you didn’t write. But in 2025, that trust comes with a serious risk. Every few weeks, we’re seeing…
Gemini AI hijacked, Nvidia rejects AI chip backdoors, phishers abuse Microsoft 365
Hackers hijacked Google’s Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers’ data by breaching its Salesforce database Huge thanks to…
WhatsApp Removes 6.8 Million Accounts Over Malicious Activity Concerns
WhatsApp has permanently removed 6.8 million accounts during the first half of 2024 as part of an aggressive crackdown on global scamming operations, parent company Meta announced this week. The massive account purge primarily targeted sophisticated fraud networks operating from…