Security
Headlines
HeadlinesLatestCVEs

Source

HackRead

Billions of Apple Devices at Risk from “AirBorne” AirPlay Vulnerabilities

Oligo Security uncovers “AirBorne,” a set of 23 vulnerabilities in Apple AirPlay affecting billions of devices. Learn how…

HackRead
#vulnerability#mac#apple#rce#perl#wifi
Phishing Emails Impersonating Qantas Target Credit Card Info

Fake Qantas emails in a sophisticated phishing scam steal credit card and personal info from Australians, bypassing major…

Police Seize Dark Web Shop Pygmalion, Access User Data from 7K Orders

German police seized the dark web shop Pygmalion, gaining access to customer data linked to over 7,000 drug…

UK Luxury Retailer Harrods Hit by Cyber Attack After M&S, Co-op

Luxury retailer Harrods confirms a cyber attack attempt, restricting internet access but keeping its online store running. Learn…

200+ Fake Retail Sites Used in New Wave of Subscription Scams

Bitdefender uncovers a massive surge in sophisticated subscription scams disguised as online shops and evolving mystery boxes. Learn…

npm Malware Targets Crypto Wallets, MongoDB; Code Points to Turkey

Sonatype discovered ‘crypto-encrypt-ts’, a malicious npm package impersonating the popular CryptoJS library to steal crypto and personal data.…

Scammers Use Spain-Portugal Blackout for TAP Air Refund Phishing Scam

SEO: Cybercriminals are using the recent power outages in Spain and Portugal to launch phishing attacks disguised as…

Ticket Resale Platform TicketToCash Left 200GB of User Data Exposed

A misconfigured, non-password-protected database belonging to TicketToCash exposed data from 520,000 customers, including PII and partial financial details.…

Online Child Exploitation Network 764 Busted; 2 US Leaders Arrested

US and Greek arrests expose 764 network’s global child abuse ring. Leaders face life for orchestrating violent exploitation…

From TV5Monde to Govt: France Blames Russia’s APT28 for Cyberattacks

France accuses Russia’s APT28 hacking group (Fancy Bear) of targeting French government entities in a cyber espionage campaign.…