Shopping News / Articles
New mac OS Malware notnull OSX Targets Crypto Wallets Over $10 K
1+ hour, 48+ min ago (356+ words) Cybersecurity researchers at Moonlock Lab have identified a new mac OS malware strain, notnull OSX, engineered to drain cryptocurrency wallets. In particular, it uses a submission form to assess a victim's financial holdings, targeting only those with balances exceeding 10, 000 USD....
Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign
21+ hour, 24+ min ago (692+ words) Deeba is a veteran cybersecurity reporter at Hackread. com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform's trusted coverage. Operation Masquerade: FBI Disrupts…...
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Flaw Disclosure
23+ hour, 23+ min ago (494+ words) A notorious group of hackers is currently causing major disruption globally by deploying the devastating Medusa ransomware. Tracked by Microsoft Threat Intelligence as Storm-1175, these hackers have turned the gap between a security flaw being found and a fix being…...
Russian Forest Blizzard Hackers Hijack Home Routers for Global Spying
1+ day, 2+ hour ago (330+ words) A hacking group linked to Russian military intelligence, identified as Forest Blizzard hackers (aka Fancy Bear), has been caught exploiting thousands of home and small-office routers to conduct a massive surveillance operation. According to Microsoft Threat Intelligence, which published its…...
New Click Fix Attack Uses Node. js Malware via Tor to Steal Crypto
1+ day, 4+ hour ago (428+ words) We've all done it- clicked a box to prove we're not a robot without thinking twice. But according to the latest research from Netskope Threat Labs, that split-second habit is exactly what scammers are banking on. This operation, known as…...
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware
1+ day, 19+ hour ago (265+ words) However, instead of the promised software, a series of loaders installs a malicious toolkit including CNB Bot, Pure RAT, and Silent Crypto Miner. These tools give the hackers full remote access to your files, the ability to update their malicious…...
Grafana Ghost Vulnerability Allows Data Theft via AI Injection
1+ day, 21+ hour ago (611+ words) Cybersecurity researchers at the firm Noma Security have identified a serious vulnerability named Grafana Ghost. This flaw affects Grafana, a popular software platform that many companies use as a central hub to monitor their financial metrics, infrastructure health, and private…...
AI Agents and Non-Human Identities Creating Critical Security Gaps, Report
2+ day, 1+ hour ago (296+ words) Businesses are rushing to adopt automation, but they are leaving a significant security gap in their infrastructure as new data suggests this technological race is moving much faster than the security needed to protect it. On 7 April 2026, password security firm…...
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins
2+ day, 21+ hour ago (382+ words) The way wars are fought today has changed, and our smartphones have become part of the battle. Hackers always want to cash in on political or regional conflicts, and they are now connecting their scams with the latest news about…...
Cloudflare Targets Word Press With New AI-Powered Em Dash CMS
2+ day, 23+ hour ago (728+ words) Deeba is a veteran cybersecurity reporter at Hackread. com with over a decade of experience covering cybercrime, vulnerabilities, and security events. Her expertise and in-depth analysis make her a key contributor to the platform's trusted coverage. Cloudflare Targets Word Press…...
Shopping
Please enter a search for detailed shopping results.