In early August 2025, cybersecurity teams in Türkiye observed a new, highly evasive Java‐based loader that slipped past every public sandbox, antivirus solution, and even enterprise EDR/XDR platforms. This threat—codenamed SoupDealer—surfaced as a phishing campaign distributing a three‐stage loader via…
Tag: EN
Win-DoS’ Zero-Click Exploit Could Weaponize Windows Infrastructure for DDoS Attacks
Security researchers have uncovered a “zero-click” denial-of-service chain that can silently turn thousands of Microsoft Windows Domain Controllers (DCs) into a globe-spanning botnet, raising fresh alarms in a year already defined by record-breaking distributed-denial-of-service (DDoS) activity. DDoS attacks climbed 56%…
Data Mesh Security: How to Protect Decentralized Data Architectures
The rise of data mesh architectures redefines how modern organizations have approached the concept of data security. Standard best practices dictate that data should be centralized, allowing it to be collected, stored, and governed within monolithic systems, such as data…
I captured 500 photos with the two best Android camera phones – and there’s a clear winner
I took the Samsung Galaxy S25 Ultra and the Oppo Find X8 Ultra on a trip to Sweden, but only one of them will stay in my bag for the next trip. This article has been indexed from Latest news…
A default TV setting is ruining your viewing experience – here’s the quick fix that experts recommend
Some gamers use motion smoothing to improve performance, but it can make movies and TV shows look unnatural. Here’s how to turn it off. This article has been indexed from Latest news Read the original article: A default TV setting…
The OnePlus 12 was already our favorite budget Android phone – now it’s $250 off
With market-leading charging speeds, mega battery life, and premium build, the OnePlus 12 is a worthy rival to flagship handsets. This article has been indexed from Latest news Read the original article: The OnePlus 12 was already our favorite budget…
Chrome sandbox escape nets security researcher $250,000 reward
Researcher earns Google Chrome ’s top $250K bounty for a sandbox escape vulnerability enabling remote code execution. A researcher who goes online with the moniker ‘Micky’ earned $250,000 from Google for reporting a high-severity Chrome vulnerability. The flaw, tracked as…
Cloudflare Accuses AI Startup Perplexity of Bypassing Web Blocking Measures
Cloudflare has accused artificial intelligence company Perplexity of using hidden tactics to bypass restrictions designed to stop automated bots from collecting website data. In a statement published Monday, Cloudflare said it had received multiple complaints from its customers claiming…
Ghanaian Nationals Extradited to US Over $100M, BEC, Romance Scams
Three Ghanaian men have been extradited to the US over $100 million fraud involving romance scams and business… This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original article: Ghanaian Nationals…
Hackers Extradited to US Over $100 Million Romance Scams and Other Frauds
United States Attorney for the Southern District of New York, Jay Clayton, alongside FBI Assistant Director in Charge Christopher G. Raia, announced the unsealing of a federal indictment against four Ghanaian nationals implicated in a sophisticated international fraud network. The…
I jump-started a bus from the 1930s with this power bank – here’s my buying advice
What better way to test the Gooloo GT6000 power bank than jump-starting a six-liter diesel engine from 1934? This article has been indexed from Latest news Read the original article: I jump-started a bus from the 1930s with this power…
US scrambles to recoup $1M+ nicked by NORKs
The alleged perpetrators remain at large The US Department of Justice is trying to recoup around $1 million that three IT specialists secretly working for the North Korean government allegedly stole from a New York company.… This article has been…
Vulnerability Summary for the Week of August 4, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Adobe–Adobe Experience Manager Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability…
New TETRA Radio Encryption Flaws Expose Law Enforcement Communications
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, including in its proprietary end-to-end encryption (E2EE) mechanism that exposes the system to replay and brute-force attacks, and even decrypt encrypted traffic.…
Amazon EC2 defenses against L1TF Reloaded
The guest data of AWS customers running on the AWS Nitro System and Nitro Hypervisor is not at risk from a new attack dubbed “L1TF Reloaded.” No additional action is required by AWS customers; however, AWS continues to recommend that…
The best tablets for students in 2025: Expert recommended for back-to-school season
Our experts went hands-on with the best tablets for students from top brands like Apple, Samsung, and Wacom, just in time for back-to-school season. This article has been indexed from Latest news Read the original article: The best tablets for…
Tiny gold “super atoms” could spark a quantum revolution
Scientists have found that microscopic gold clusters can act like the world’s most accurate quantum systems, while being far easier to scale up. With tunable spin properties and mass production potential, they could transform quantum computing and sensing. This article…
NZTA Breach Results in Vehicle Theft, User Data Compromise
Data compromise leads to targeted motor theft A privacy breach has leaked the details of 1000 people (estimate) in a Transport firm’s database over the past year. According to the agency, the breach targeted 13 vehicles for theft. The problem…
40,000 WordPress Sites Affected by Arbitrary File Read Vulnerability in UiCore Elements WordPress Plugin
On June 13th, 2025, we received a submission for an Arbitrary File Read vulnerability in UiCore Elements, a WordPress plugin with more than 40,000 active installations. This vulnerability makes it possible for an unauthenticated attacker to read arbitrary files on…
Erlang/OTP SSH RCE Vulnerability Actively Exploited to Target OT Networks
A severe vulnerability, designated CVE-2025-32433 with a CVSS score of 10.0, has been identified in the Secure Shell (SSH) daemon of the Erlang programming language’s Open Telecom Platform (OTP). This flaw permits unauthenticated remote code execution (RCE) by allowing attackers…