HackRead

HackRead

Publication
0 followers

UK-based news site focusing on infosec, cybercrime, and hacking.

Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign
NewsApr 8, 2026

Operation Masquerade: FBI Disrupts Russian Router Hacking Campaign

The Department of Justice and FBI announced the takedown of a Russian GRU‑run cyber‑espionage operation, dubbed Operation Masquerade, that compromised thousands of home and small‑office routers, primarily TP‑Link devices, across 23 U.S. states and abroad. The attackers, identified as the APT28/Fancy Bear...

By HackRead
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware
NewsApr 7, 2026

Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware

Since late 2023, the REF1695 hacker group has been embedding Monero‑mining malware in counterfeit software installers that masquerade as non‑profit projects. The scheme uses a fake ISO download, a persuasive ReadMe.txt, and instructions to bypass Windows SmartScreen, delivering a toolkit...

By HackRead
AI Agents and Non-Human Identities Creating Critical Security Gaps, Report
NewsApr 7, 2026

AI Agents and Non-Human Identities Creating Critical Security Gaps, Report

Keeper Security’s new report, presented at RSA 2026, reveals that companies are rapidly deploying AI agents and other non‑human identities (NHIs) without adequate security controls. Nearly half of surveyed firms give AI‑powered tools access to critical data, yet 76% lack...

By HackRead
Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins
NewsApr 6, 2026

Missile Alert Phishing Exploits Iran-US-Israel Conflict for Microsoft Logins

Researchers at Cofense uncovered a new phishing campaign that disguises itself as urgent missile‑alert emails tied to the Iran‑Israel conflict. The messages, sent from a spoofed Ministry of Interior address, contain QR codes that lead victims to a counterfeit Microsoft...

By HackRead
Cloudflare Targets WordPress With New AI-Powered EmDash CMS
NewsApr 6, 2026

Cloudflare Targets WordPress With New AI-Powered EmDash CMS

Cloudflare has unveiled EmDash CMS, a server‑less, AI‑built content platform designed to rival WordPress, which powers over 40% of websites. EmDash isolates each plugin in a Dynamic Worker sandbox, limiting access to declared permissions and addressing the 96% plugin‑related security...

By HackRead
Why Security Researchers and Red Teams Are Turning to Workflow Automation
NewsApr 6, 2026

Why Security Researchers and Red Teams Are Turning to Workflow Automation

Security teams are increasingly adopting workflow automation to combat alert fatigue and accelerate investigations. Automated pipelines now enrich indicators of compromise, aggregate threat intelligence, and run continuous recon for red teams and bug bounty hunters. Open‑source, self‑hosted platforms such as...

By HackRead
Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users
NewsApr 3, 2026

Fake ChatGPT Ad Blocker Chrome Extension Caught Spying on Users

A counterfeit Chrome extension named “ChatGPT Ad Blocker” was discovered harvesting users' ChatGPT conversations under the guise of removing ads. DomainTools found the malicious add‑on on the Chrome Web Store in February 2026, where it cloned the page’s DOM, stripped...

By HackRead
AI Future: The Leading International AI and Web3 Forum to Take Place in April
NewsApr 3, 2026

AI Future: The Leading International AI and Web3 Forum to Take Place in April

AI Future, the flagship event of the global Blockchain Forum, will convene in Moscow on April 14‑15, drawing over 20,000 participants from 100 countries. The two‑day summit features 200 speakers and 250 sponsors, focusing on the intersection of artificial intelligence...

By HackRead
ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak
NewsApr 2, 2026

ShinyHunters Hackers Claim Theft of 3M+ Cisco Records, Threaten Public Leak

ShinyHunters, identified as UNC6040, issued a final warning to Cisco, demanding contact before April 3 2026 or face a public data leak. The group alleges it has exfiltrated more than three million Salesforce records, along with GitHub repositories, AWS storage buckets, and...

By HackRead
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts
NewsApr 2, 2026

Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Storm, a new infostealer discovered by Varonis Threat Labs in early 2026, can decrypt Chrome’s App‑Bound Encryption and harvest credentials, session cookies, crypto wallets, and messaging app accounts from Chrome, Edge, Firefox and other browsers. The malware is offered as...

By HackRead
Why GitHub Developers Are Targeted by Token Giveaway Scams
NewsApr 2, 2026

Why GitHub Developers Are Targeted by Token Giveaway Scams

GitHub developers are increasingly targeted by sophisticated token giveaway scams that masquerade as legitimate project announcements. Attackers exploit developers' public activity, mimicking maintainers, using authentic branding, and leveraging technical language to appear credible. The scams rely on urgency, hidden malicious...

By HackRead
LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts
NewsApr 1, 2026

LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts

A new phishing campaign is tricking LinkedIn users with counterfeit notification emails that appear to come from the platform. The emails, sent from a freshly registered khanieteam.com domain, direct victims to a look‑alike site (inedindigital) that harvests login credentials. Cofense's...

By HackRead
Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus
NewsApr 1, 2026

Ransomware Groups Exploit Legit IT Tools to Bypass Antivirus

Researchers at Seqrite have identified a "dual‑use dilemma" where ransomware groups repurpose legitimate IT utilities such as IOBit Unlocker and Process Hacker to disable antivirus software. These signed tools allow attackers to create a silent zone, bypassing traditional signature‑based defenses...

By HackRead
ImageMagick Zero-Day Enables RCE on Linux and WordPress Servers
NewsApr 1, 2026

ImageMagick Zero-Day Enables RCE on Linux and WordPress Servers

Octagon Networks uncovered a critical ImageMagick zero‑day that enables remote code execution on major Linux distributions and WordPress sites. The flaw, dubbed a “magic byte shift,” lets attackers disguise malicious scripts as harmless images, bypassing file‑extension checks and even secure...

By HackRead
AI Agents Are Democratizing Finance but Also Redefining Risk
NewsMar 31, 2026

AI Agents Are Democratizing Finance but Also Redefining Risk

AI agents are now moving capital autonomously, turning complex arbitrage strategies into simple commands and democratizing access to sophisticated finance. Users have seen outsized returns, such as a $300 investment growing to over $2.3 million in four months, thanks to rapid,...

By HackRead
Kernel Observability for Data Movement
NewsMar 30, 2026

Kernel Observability for Data Movement

Modern security stacks rely on user‑space logs, leaving a blind spot at the operating system layer where data actually moves. Kernel‑mediated events—file reads, network writes, process creation—provide a complete, immutable record of every data flow, yet most tools never tap...

By HackRead
OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens
NewsMar 30, 2026

OpenAI Codex Vulnerability Allowed Attackers to Steal GitHub Tokens

BeyondTrust Phantom Labs uncovered a critical command‑injection flaw in OpenAI's Codex that leveraged hidden Unicode characters in GitHub branch names to steal OAuth tokens. The vulnerability affected the ChatGPT web interface, Codex SDK, and several developer extensions, exposing full repository...

By HackRead
Wave Browser Brings Gaming Tools and Ocean Cleanup Into the Same Tab
NewsMar 30, 2026

Wave Browser Brings Gaming Tools and Ocean Cleanup Into the Same Tab

Wave Browser launches as a gaming‑focused web browser that bundles multitasking tools such as a sidebar, picture‑in‑picture streaming, and a Memory Saver mode to keep RAM usage low during heavy gaming sessions. The browser embeds utilities like ad blocking, translation,...

By HackRead
15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow
NewsMar 30, 2026

15-Year-Old strongSwan Flaw Lets Attackers Crash VPNs via Integer Underflow

A fifteen‑year‑old integer underflow bug (CVE‑2026‑25075) in strongSwan’s EAP‑TTLS plugin can crash VPN services by requesting an impossible 18 exabyte memory allocation. The flaw affects versions 4.5.0 through 6.0.4 and triggers a two‑phase “ghost” attack that only crashes the charon daemon...

By HackRead
Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M
NewsMar 30, 2026

Dark Web Market Lists Alleged 375TB Lockheed Martin Data for $600M

Hackers on the dark‑web marketplace Threat Market claim to have obtained 375 TB of Lockheed Martin data and are offering it for a $600 million buy‑out. The alleged sale, posted via a Telegram account linked to the market and attributed to an APT...

By HackRead
ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database
NewsMar 27, 2026

ShinyHunters Walk Away From BreachForums, Leak 300,000-User Database

The ShinyHunters hacker collective announced it is abandoning BreachForums, labeling the platform a waste of time after an FBI seizure in October 2025. Simultaneously, the group released a fresh dump containing data on more than 300,000 BreachForums users, including full...

By HackRead
BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks
NewsMar 27, 2026

BianLian Ransomware Spreads via Fake Invoice SVG Images in New Attacks

WatchGuard researchers have uncovered a new BianLian ransomware campaign that distributes malicious SVG invoice images to companies in Venezuela. The SVG files hide XML code that silently contacts a shortened ja.cat URL, redirects through compromised Brazilian domains, and drops a...

By HackRead
Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users
NewsMar 26, 2026

Quish Splash QR Code Phishing Campaign Hits 1.6 Million Users

Researchers at 7AI uncovered the "Quish Splash" campaign, which dispatched over 1.6 million phishing emails in less than three weeks. The attackers embedded malicious URLs inside BMP‑format QR‑code images, a technique that slipped past Microsoft Defender and other email filters. By...

By HackRead
New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data
NewsMar 26, 2026

New PXA Stealer Malware Targets Banks, Uses Telegram to Exfiltrate Data

CyberProof reports a 8‑10% surge in PXA Stealer attacks on financial institutions during Q1 2026, positioning the malware as the successor to takedown‑prone infostealers like RedLine and Lumma. The campaign spreads through convincing phishing emails that mimic tax forms, legal notices, or...

By HackRead
Acalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity
NewsMar 26, 2026

Acalvio ShadowPlex Review: Deception-Based Preemptive Cybersecurity

Acalvio ShadowPlex is an AI‑powered, agentless deception platform that projects decoys, breadcrumbs, and honeytokens across endpoints, cloud, OT, and identity layers to detect attacker intent early. The solution feeds high‑confidence alerts into existing SOC workflows via integrations with SIEM, SOAR,...

By HackRead
Best Klaviyo Alternatives for Revenue Growth and Advanced Analytics
NewsMar 25, 2026

Best Klaviyo Alternatives for Revenue Growth and Advanced Analytics

Klaviyo remains a leading CRM for e‑commerce, but its cost and complexity can deter startups. The article highlights three cost‑effective alternatives—Maestra, Brevo, and Omnisend—that deliver advanced analytics and multi‑channel performance tracking. Each platform offers customizable attribution, granular revenue dashboards, and...

By HackRead
Understanding Wiz’s Approach to Securing the AI Supply Chain
NewsMar 24, 2026

Understanding Wiz’s Approach to Securing the AI Supply Chain

The AI supply chain’s layered, multi‑cloud nature creates visibility gaps and unique vulnerabilities that traditional software‑security tools can’t fully address. Wiz proposes an AI‑CNAPP framework that unifies asset discovery, cloud‑posture management, workload protection, and continuous risk assessment across the entire...

By HackRead
All AI and Security Teams Need Transparent Data Pipelines
NewsMar 24, 2026

All AI and Security Teams Need Transparent Data Pipelines

Organizations that rely on opaque AI data sources expose themselves to integrity risks, compliance gaps, and trust deficits. Without auditable pipelines, security teams cannot verify data quality, leading to hallucinations and regulatory violations such as under the EU AI Act....

By HackRead
OVHcloud Founder Denies Massive 590TB Data Breach Claims
NewsMar 24, 2026

OVHcloud Founder Denies Massive 590TB Data Breach Claims

OVHcloud founder Octave Klaba denied a purported 590 TB data breach alleged by a user on BreachForums. The poster claimed to have exfiltrated data from 1.6 million OVH Fresh customers and up to 6 million active websites, yet only supplied a trivial email‑and‑phone sample....

By HackRead
Gcore Radar Report Reveals 150% Surge in DDoS Attacks Year-on-Year
NewsMar 24, 2026

Gcore Radar Report Reveals 150% Surge in DDoS Attacks Year-on-Year

Gcore’s Q3‑Q4 2025 Radar report shows a 150% year‑on‑year jump in DDoS incidents, with attack counts climbing to 1.3 million in Q4 2025. Peak traffic surged to 12 Tbps, a six‑fold rise over the previous year, while network‑layer attacks now represent 82% of all...

By HackRead
Playnance Introduces Participation-First Model for Social Gaming with New Protocol Launch
NewsMar 23, 2026

Playnance Introduces Participation-First Model for Social Gaming with New Protocol Launch

Playnance launched its Democratic Social Gaming Protocol, a participation‑first system that links player activity to economic outcomes via the GCOIN token. The blockchain‑backed architecture promises transparent, verifiable reward distribution, moving away from traditional profit‑centric models. Over one million users now...

By HackRead
North Korean Hacker Lands Remote IT Job, Caught After VPN Slip
NewsMar 23, 2026

North Korean Hacker Lands Remote IT Job, Caught After VPN Slip

A North Korean hacker answered a generic help‑wanted ad, passed standard background checks, and was hired for a remote IT role handling sensitive Salesforce data on August 15, 2025. Ten days later, a login from an unmanaged device in St. Louis,...

By HackRead
Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks
NewsMar 23, 2026

Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks

International law enforcement agencies, led by the US DOJ and FBI, dismantled four major botnets—Aisuru, KimWolf, JackSkid and Mossad—that had compromised over three million IoT devices. At their peak, the networks could generate 30 terabits per second of traffic, powering some...

By HackRead
Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach
NewsMar 20, 2026

Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach

LAPSUS$ has posted a claim that it exfiltrated roughly 3 GB of AstraZeneca data, including source code, cloud‑infrastructure configurations, and employee‑related records. The group shared sample files that appear to contain authentic GitHub Enterprise user exports and contractor onboarding logs, suggesting...

By HackRead
CISO Whisperer Names 11 Vendors Leading the Shift From Tools to Outcomes at RSA Conference 2026
NewsMar 19, 2026

CISO Whisperer Names 11 Vendors Leading the Shift From Tools to Outcomes at RSA Conference 2026

The CISO Whisperer has identified 11 cybersecurity vendors at RSA Conference 2026 that exemplify the industry’s move from reactive tools to outcome‑driven, AI‑powered operations. Companies such as Daylight Security, Reclaim Security and CyCognito showcase models that turn detection into automated...

By HackRead
SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft
NewsMar 19, 2026

SpyCloud’s 2026 Identity Exposure Report Reveals Explosion of Non-Human Identity Theft

SpyCloud’s 2026 Identity Exposure Report reveals a sharp rise in non‑human identity theft, with 18.1 million API keys and tokens and 6.2 million AI‑tool credentials exposed in 2025. Phishing records surged 400 % YoY, delivering 28.6 million compromised identities, while 8.6 billion session cookies were...

By HackRead
Fake Windsurf IDE Extension Uses Solana Blockchain to Steal Developer Data
NewsMar 19, 2026

Fake Windsurf IDE Extension Uses Solana Blockchain to Steal Developer Data

Bitdefender uncovered a counterfeit Windsurf IDE extension that pretends to be the legitimate REditorSupport tool for the R language. The malicious plug‑in drops native node files and uses a PowerShell task named UpdateApp to maintain persistence. Uniquely, it communicates via...

By HackRead
Computer Vision Frameworks: Features And Future Trends
NewsMar 18, 2026

Computer Vision Frameworks: Features And Future Trends

Computer vision frameworks provide developers with pre‑built algorithms for image processing, model training, and deployment across platforms. They integrate deep learning libraries like PyTorch and TensorFlow, offering features such as pre‑trained models, data augmentation, and visualization tools. Frameworks are categorized...

By HackRead
New .NET AOT Malware Hides Code as a Black Box to Evade Detection
NewsMar 18, 2026

New .NET AOT Malware Hides Code as a Black Box to Evade Detection

Researchers at Howler Cell have identified a new .NET Ahead‑of‑Time (AOT) compiled malware that strips metadata, turning the malicious binary into a black‑box that evades traditional security scanners. The infection chain begins with a phishing ZIP, delivering a downloader that...

By HackRead
Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents
NewsMar 17, 2026

Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents

Orchid Security has been named a Representative Vendor in Gartner’s inaugural Market Guide for Guardian Agents, which focuses on managing identities and access for AI agents with zero‑trust policies. The guide warns that AI agents expand “identity dark matter,” creating...

By HackRead
GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub
NewsMar 17, 2026

GitGuardian Reports an 81% Surge of AI-Service Leaks as 29M Secrets Hit Public GitHub

GitGuardian’s 2026 State of Secrets Sprawl report reveals an 81% year‑over‑year surge in AI‑service credential leaks, pushing total exposed secrets on public GitHub to roughly 29 million. AI‑assisted coding, exemplified by Claude Code, shows a 3.2% leak rate—about twice the platform...

By HackRead
New Vidar 2.0 Infostealer Spreads via Fake Game Cheats on GitHub, Reddit
NewsMar 17, 2026

New Vidar 2.0 Infostealer Spreads via Fake Game Cheats on GitHub, Reddit

Cybersecurity firm Acronis TRU uncovered a large‑scale campaign distributing the Vidar 2.0 infostealer through fake game‑cheat files hosted on GitHub and promoted on Reddit and Discord. The malware, rewritten in C for greater speed and stealth, is sold as Malware‑as‑a‑Service for $130‑$750...

By HackRead
Kevuru Games Outlines the Shift Toward Flexible Art Production in the Games Industry
NewsMar 16, 2026

Kevuru Games Outlines the Shift Toward Flexible Art Production in the Games Industry

Kevuru Games asserts that art outsourcing has evolved into a core component of modern game development, driven by larger project scopes, longer production cycles, and heightened visual expectations. The global games market, valued at $188.8 billion in 2025, is projected to...

By HackRead
Gaming Clans Become Growth Engine for Playnance Ecosystem
NewsMar 15, 2026

Gaming Clans Become Growth Engine for Playnance Ecosystem

Playnance announced a strategic partnership with KGeN, linking its Web3 entertainment platform to KGeN’s network of over 53 million verified gamers. The collaboration taps more than 30,000 gaming clans spread across 60 countries, giving Playnance direct access to tightly‑connected community leaders. Through...

By HackRead
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
NewsMar 13, 2026

AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP

AI‑HealthTech firm Humata Health announced a partnership with security specialist AccuKnox to embed Zero‑Trust CNAPP and Application Security Posture Management into its SaaS platform. The solution, deployed on‑premises, satisfies HIPAA requirements and integrates with Azure DevOps and GitLab for automated...

By HackRead
Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages
NewsMar 12, 2026

Hackers Use Cloudflare Human Check to Hide Microsoft 365 Phishing Pages

Security researchers have uncovered a new phishing technique that leverages Cloudflare's Turnstile human‑verification widget to conceal fraudulent Microsoft 365 login pages. The malicious sites present a Turnstile challenge, then use the visitor's IP to identify security professionals or bots and serve...

By HackRead
Maintaining Security and Protecting Smart Home Devices From Hackers
NewsMar 12, 2026

Maintaining Security and Protecting Smart Home Devices From Hackers

Smart home devices boost convenience and energy savings but are increasingly targeted by cybercriminals. Common flaws include weak default passwords, lack of updates, and unsegmented Wi‑Fi networks that let attackers move laterally. Recent incidents, such as a robot vacuum breach...

By HackRead
New PixRevolution Malware Steals Brazil’s PIX Transfers in Real Time
NewsMar 12, 2026

New PixRevolution Malware Steals Brazil’s PIX Transfers in Real Time

Brazil’s instant payment platform PIX, handling billions of transactions monthly, is being targeted by a new Android malware called PixRevolution. The threat uses an agent‑in‑the‑loop model, displaying a fake loading screen while a human or AI operator swaps the recipient’s...

By HackRead
Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone
NewsMar 11, 2026

Iran-Linked Handala Hackers Claim Major Hacks on Stryker and Verifone

Iran‑linked Handala Hack Team announced cyberattacks on medical‑device maker Stryker and payment‑technology firm Verifone on March 11. Stryker confirmed a network disruption in its Microsoft‑based environment but reported no ransomware or data loss, while Verifone said it found no evidence of...

By HackRead