Category: HackRead | Latest Cybersecurity and Hacking News Site

ChatGPT’s False Information Generation Enables Code Malware

By Habiba Rashid Researchers have warned that cyber criminals may exploit ChatGPT’s AI Package Hallucination to spread malicious code, including malware infection. This is a post from HackRead.com Read the original post: ChatGPT’s False Information Generation Enables Code Malware This…

How to Create an Accessible Website and Why It Matters

By Owais Sultan Have you ever tried to access a website only to find that it’s difficult or impossible to navigate?… This is a post from HackRead.com Read the original post: How to Create an Accessible Website and Why It…

Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted

By Waqas Initially, reports suggested that only radio messages were affected. However, subsequent investigations and recordings revealed that the fraudulent messages were also displayed on television screens. This is a post from HackRead.com Read the original post: Deepfake Cyber Attack…

Hackers Leak i2VPN Admin Credentials on Telegram

By Waqas If the alleged admin login credentials are authentic, i2VPN users are at risk of a massive security and privacy breach. This is a post from HackRead.com Read the original post: Hackers Leak i2VPN Admin Credentials on Telegram This…

Atomic Wallet Hit by $35M Theft in Recent Crypto Breach

By Habiba Rashid The stolen tokens include popular cryptocurrencies such as Bitcoin (BTC), ether (ETH), tether (USDT), dogecoin (DOGE), Litecoin (LTC), BNB coin (BNB), and polygon (MATIC).  This is a post from HackRead.com Read the original post: Atomic Wallet Hit…

Kaspersky Reveals iPhones of Employees Infected with Spyware

By Waqas The researchers discovered the oldest traces of infection in 2019, and it is believed that the attack is still active. This is a post from HackRead.com Read the original post: Kaspersky Reveals iPhones of Employees Infected with Spyware…

Shiba Inu: The Meme Coin Fueling an Open-Source Ecosystem

By Owais Sultan The cryptocurrency niche has come a long way since Bitcoin’s inception and it is now far from the… This is a post from HackRead.com Read the original post: Shiba Inu: The Meme Coin Fueling an Open-Source Ecosystem…

How To Reduce Cost Overruns For AI Implementation Projects

By Owais Sultan AI implementations can be costly and drain their allotted budgets. Thankfully, you can learn how to reduce your… This is a post from HackRead.com Read the original post: How To Reduce Cost Overruns For AI Implementation Projects…

SimpleTire Database Leak: Over 2.8 Million Records Exposed

By Habiba Rashid Despite Fowler’s efforts to responsibly disclose the issue, he received no response from the company. This is a post from HackRead.com Read the original post: SimpleTire Database Leak: Over 2.8 Million Records Exposed This article has been…

Tenet and LayerZero Forge Cross-Chain LSD Adoption

By Owais Sultan Tenet and LayerZero Partner to Pioneer Cross-Chain Liquidity for Liquid Staking Derivatives. This is a post from HackRead.com Read the original post: Tenet and LayerZero Forge Cross-Chain LSD Adoption This article has been indexed from HackRead |…

Raidforums Database Leak: Data of 460,000 Users Dumped Online

By Waqas An analysis by Hackread.com indicates that the database is legitimate since it contains details of the forum’s founder, Omnipotent. This is a post from HackRead.com Read the original post: Raidforums Database Leak: Data of 460,000 Users Dumped Online…

Data Breach at MCNA Dental Insurer Impacts 9 Million Users

By Habiba Rashid The hackers managed to steal highly sensitive data in the data breach, including Social Security numbers, names, addresses, phone numbers, email addresses, and more. This is a post from HackRead.com Read the original post: Data Breach at…

Jimbos Protocol Hack: $7.5 Million Lost in Latest DeFi Attack

By Habiba Rashid The attack on Jimbos Protocol exploited a critical vulnerability related to the lack of slippage control on liquidity conversions. This is a post from HackRead.com Read the original post: Jimbos Protocol Hack: $7.5 Million Lost in Latest…

Gaming Firms and Community Members Hit by Dark Frost Botnet

By Deeba Ahmed According to researchers, the most prominent targets of Dark Frost include gaming companies, online streaming services, game server hosting providers, and gaming community members. This is a post from HackRead.com Read the original post: Gaming Firms and…

Mirai Malware Hits Zyxel Devices After Command Injection Bug

By Deeba Ahmed A variant of the Mirai botnet is targeting Zyxel Firewalls after exploiting a newly patched operating system command injection vulnerability. This is a post from HackRead.com Read the original post: Mirai Malware Hits Zyxel Devices After Command…

How Cross-Chain DEXes are Democratizing the Crypto Market?

By Owais Sultan In this article, we will explore how cross-chain DEXes are revolutionizing the crypto market and levelling the playing field for traders of all backgrounds. This is a post from HackRead.com Read the original post: How Cross-Chain DEXes…

Free VPN Service SuperVPN Exposes 360 Million User Records

By Habiba Rashid SuperVPN is the same free VPN service provider that leaked customers’ data back in May 2022. This is a post from HackRead.com Read the original post: Free VPN Service SuperVPN Exposes 360 Million User Records This article…

Memcyco Introduces Real-Time Solution to Combat Brandjacking

By Owais Sultan Memcyco Unveils Groundbreaking Solution to Combat Brandjacking in Real Time, Safeguarding Digital Trust and Reinforcing Brand Reputation. This is a post from HackRead.com Read the original post: Memcyco Introduces Real-Time Solution to Combat Brandjacking This article has…

The Pros and Cons of Smart Homes

By Owais Sultan The world is more connected than ever before, and the rise of the smart home is just one… This is a post from HackRead.com Read the original post: The Pros and Cons of Smart Homes This article…

5 Ways Smart Contracts Are Making A Real-World Difference

By Waqas One of the most promising innovations in the blockchain industry is the smart contract. They provide a superior… This is a post from HackRead.com Read the original post: 5 Ways Smart Contracts Are Making A Real-World Difference This…

Popular Android Screen Recorder iRecorder App Revealed as Trojan

By Waqas According to ESET, iRecorder was infected with a variant of AhMyth, which is an open-source remote administration tool capable of extracting sensitive data from Android devices. This is a post from HackRead.com Read the original post: Popular Android…

DarkBERT: Enhancing Cybersecurity Efforts on the Dark Web

By Habiba Rashid DarkBERT is based on the RoBERTa architecture and leverages the power of AI to navigate the dark web. This is a post from HackRead.com Read the original post: DarkBERT: Enhancing Cybersecurity Efforts on the Dark Web This…

Teen Charged in DraftKings Data Breach

By Waqas If convicted, the alleged culprit Joseph Garrison could face a maximum sentence of 57 years. This is a post from HackRead.com Read the original post: Teen Charged in DraftKings Data Breach This article has been indexed from HackRead…

FBI, GCHQ Unite To Foil Russian Malware Hacking Tool

By Owais Sultan A joint advisory from the National Cyber Security Centre has detailed how the UK and its allies have cracked Snake, a Russian malware used by the FSB. This is a post from HackRead.com Read the original post:…

Guide to Choosing the Best Family Cell Phone Plan

By Owais Sultan In a world where staying connected is paramount, the need for a reliable and affordable family cell phone… This is a post from HackRead.com Read the original post: Guide to Choosing the Best Family Cell Phone Plan…

Facebook glitch sent unintended friend requests to users

By Habiba Rashid Meta swiftly acknowledged the Facebook glitch and issued an apology, citing it as a consequence of a recent app update. This is a post from HackRead.com Read the original post: Facebook glitch sent unintended friend requests to…

What Makes Bitcoin NFTs Different from Other NFTs?

By Owais Sultan Non-fungible tokens (NFTs) have been gaining traction in the cryptocurrency world. They are digital assets that represent unique… This is a post from HackRead.com Read the original post: What Makes Bitcoin NFTs Different from Other NFTs? This…

Google offers Dark Web monitoring for US Gmail users

By Deeba Ahmed Google said that with its dark web monitoring feature, not only will users be able to check their… This is a post from HackRead.com Read the original post: Google offers Dark Web monitoring for US Gmail users…

Op PowerOFF: 13 Domains Linked to DDoS-For-Hire Services Seized

By Habiba Rashid Operation PowerOFF is an effort to dismantle DDoS-for-hire infrastructures worldwide, targeting operators engaged in criminal activities. This is a post from HackRead.com Read the original post: Op PowerOFF: 13 Domains Linked to DDoS-For-Hire Services Seized This article…

7 Rules Of Risk Management For Cryptocurrency Users

By Owais Sultan Trading or investing in cryptocurrencies can be highly lucrative. But the extreme price movements often discourage beginners to… This is a post from HackRead.com Read the original post: 7 Rules Of Risk Management For Cryptocurrency Users This…

Seized: 9 Crypto Laundering Sites Used by Ransomware Gangs

By Deeba Ahmed International cooperation between the Ukrainian Cyber and National Police, the FBI, and the Department of Justice has led to the seizure of cybercriminals’ cryptocurrency laundering websites. This is a post from HackRead.com Read the original post: Seized:…

9 Cryptocurrency Laundering Sites Seized by Law Enforcement

By Deeba Ahmed International cooperation between the Ukrainian Cyber and National Police, the FBI, and the Department of Justice has led to the seizure of cybercriminals’ cryptocurrency laundering websites. This is a post from HackRead.com Read the original post: 9…

What are Residential proxies and what is their use?

By Waqas Residential proxies are IP addresses assigned to real residential devices, such as laptops or smartphones, that are provided… This is a post from HackRead.com Read the original post: What are Residential proxies and what is their use? This…

Card Skimmers and ATMs Used to Drain EBT Accounts in SoCal

By Waqas Thirteen people have been arrested for allegedly stealing millions of dollars from low-income Southern California residents, according to… This is a post from HackRead.com Read the original post: Card Skimmers and ATMs Used to Drain EBT Accounts in…

Mullvad VPN’s Office Raided By Police for User Data

By Waqas The raid took place at the Gothenburg office of Mullvad VPN on April 18th, 2023. This is a post from HackRead.com Read the original post: Mullvad VPN’s Office Raided By Police for User Data This article has been…

Enhancing Productivity with ChatGPT-Powered Wondershare PDFelement

By Owais Sultan AI technology, particularly ChatGPT, has rapidly gained traction in various industries due to its ability to provide efficient… This is a post from HackRead.com Read the original post: Enhancing Productivity with ChatGPT-Powered Wondershare PDFelement This article has…

Goldoson Android Malware Found in 60 Apps with 100M Downloads

By Deeba Ahmed The malware was identified by cybersecurity researchers at McAfee. This is a post from HackRead.com Read the original post: Goldoson Android Malware Found in 60 Apps with 100M Downloads This article has been indexed from HackRead |…

BlackCat (ALPHV) Gang Claims Ransomware Attack on NCR Data Center

By Deeba Ahmed Blackcat ransomware initially claimed responsibility for the ransomware attack on its dark web blog, but later removed its post, indicating negotiations between the two parties. This is a post from HackRead.com Read the original post: BlackCat (ALPHV)…

LockBit Ransomware Expands Attack Spectrum to Mac Devices

By Deeba Ahmed The new ransomware was spotted by MalwareHunterTeam, which is capable of encrypting macOS devices. This is a post from HackRead.com Read the original post: LockBit Ransomware Expands Attack Spectrum to Mac Devices This article has been indexed…

QuaDream, Israeli iPhone hacking spyware firm, to shut down

By Waqas QuaDream, based in Ramat Gan, Israel, with around 40 employees, is known for its spyware used for hacking iPhones. This is a post from HackRead.com Read the original post: QuaDream, Israeli iPhone hacking spyware firm, to shut down…

Are Smart Home Devices Invading Your Privacy?

By Owais Sultan Smart home devices are becoming more and more popular in recent years, promising convenience and automation to enhance… This is a post from HackRead.com Read the original post: Are Smart Home Devices Invading Your Privacy? This article…

How To Safely Navigate the World of Crypto Finance

By Owais Sultan The world of crypto finance is rapidly evolving and providing new opportunities for individuals and businesses. With the… This is a post from HackRead.com Read the original post: How To Safely Navigate the World of Crypto Finance…

Top Mobile Security Considerations for Business Travelers

By Owais Sultan Mobile security is becoming increasingly important as we delve deeper into the era of the Internet of Things… This is a post from HackRead.com Read the original post: Top Mobile Security Considerations for Business Travelers This article…

Android App Trojans Sold on Dark Web for $25-$20,000

By Deeba Ahmed A Kaspersky study reveals security threats to the Google Play app store and how they have been exposing Android users to malware threats. This is a post from HackRead.com Read the original post: Android App Trojans Sold…

QuaDream: Israeli Cyber Mercenary Behind iPhone Hacks

By Habiba Rashid Citizens Lab and Microsoft have exposed an Israeli firm, QuaDream, selling spyware to governments around the world. This is a post from HackRead.com Read the original post: QuaDream: Israeli Cyber Mercenary Behind iPhone Hacks This article has…

Estonian Arrested: Accused of Supplying Hacking Tools to Russia

By Habiba Rashid Shevlyakov obtained delicate electronic equipment from American manufacturers for the use of Russian end-users, such as defence contractors and other government agencies This is a post from HackRead.com Read the original post: Estonian Arrested: Accused of Supplying…

KillNet Claims Creating Gay Dating Profiles with NATO Logins

By Waqas KillNet claims it carried out cyberattacks that resulted in the “paralysis” of 40% of NATO’s electronic infrastructure. This is a post from HackRead.com Read the original post: KillNet Claims Creating Gay Dating Profiles with NATO Logins This article…

What is Cloud Mining and How Does it Work?

By Owais Sultan Cloud mining is a way for you to purchase mining power from a remote data centre. Cloud mining… This is a post from HackRead.com Read the original post: What is Cloud Mining and How Does it Work?…

Cybercriminals Exploit CAN Injection Hack to Steal Cars

By Waqas If it is connected, it is vulnerable; in this case, a Toyota RAV4 model was stolen within two minutes. This is a post from HackRead.com Read the original post: Cybercriminals Exploit CAN Injection Hack to Steal Cars This…