Security
Headlines
HeadlinesLatestCVEs

Source

HackRead

4chan Breached? Hacker from Rival Soyjak Forum Claims Source Code Leak

4chan is down amid claims from a rival Soyjak forum user who says they’ve breached the site and…

HackRead
#ddos#git#php
Fake PDFCandy File Converter Websites Spread Malware

CloudSEK uncovers a sophisticated malware campaign where attackers impersonate PDFCandy.com to distribute the ArechClient2 information stealer. Learn how…

UK Software Firm Exposed 1.1TB of Healthcare Worker Records

8M UK healthcare worker records, including IDs and financial data, exposed due to a misconfigured staff management database…

New “Slopsquatting” Threat Emerges from AI-Generated Code Hallucinations

AI code tools often hallucinate fake packages, creating a new threat called slopsquatting that attackers can exploit in…

Incomplete Patch Leaves NVIDIA and Docker Users at Risk

NVIDIA's incomplete security patch, combined with a Docker vulnerability, creates a serious threat for organizations using containerized environments. This article explains the risks and mitigation strategies.

Pre-Installed Malware on Cheap Android Phones Steals Crypto via Fake WhatsApp

Cheap Android phones with preinstalled malware use fake apps like WhatsApp to hijack crypto transactions and steal wallet recovery phrases.

Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access

Hackers exploit Fortinet flaws to plant stealth backdoors on FortiGate devices, maintaining access even after patches. Update to…

Data Breach at Planned Parenthood Lab Partner Exposes Info of 1.6M

Data breach at Laboratory Services Cooperative (LSC) exposed the sensitive health and personal information of 1.6 million individuals…

Russia’s Storm-2372 Hits Orgs with MFA Bypass via Device Code Phishing

Russian APT group Storm-2372 employs device code phishing to bypass Multi-Factor Authentication (MFA). Targets include government, technology, finance,…

SaaS Security Essentials: Reducing Risks in Cloud Applications

As organizations increasingly rely on SaaS applications to run their operations, securing them has become a necessity. Without…