- Airlock Digital Announces Independent TEI Study Quantifying Measurable ROI & Security Impactby CyberNewswire on January 20, 2026 at 8:30 pm
Atlanta, GA, United States, 20th January 2026, CyberNewsWire
- ClickFix to CrashFix: KongTuke Used Fake Chrome Ad Blocker to Install ModeloRATby Deeba Ahmed on January 20, 2026 at 6:01 pm
Huntress discovers ‘CrashFix,’ a new attack by KongTuke hacker group using fake ad blockers to crash browsers and trick office workers into installing ModeloRAT malware.
- EU Launches GCVE to Track Vulnerabilities Without Relying on USby Deeba Ahmed on January 20, 2026 at 4:40 pm
The new EU-funded GCVE project is breaking dependence on US databases to track software flaws. Discover how this decentralised system aims to ensure global cybersecurity.
- Sprocket Security Appoints Eric Sheridan as Chief Technology Officerby CyberNewswire on January 20, 2026 at 3:22 pm
Madison, United States, 20th January 2026, CyberNewsWire
- Hackathon Projects Show AI Wellness Apps Can Leak Sensitive User Infoby Owais Sultan on January 20, 2026 at 1:30 pm
As emotional computing applications proliferate, the security threats they face require frameworks beyond traditional approaches.
- RansomHouse Claims Data Breach at Major Apple Contractor Luxshareby Waqas on January 20, 2026 at 1:11 pm
RansomHouse claims to have breached Apple contractor Luxshare, but no evidence has been released. Links are offline and the breach remains unverified.
- One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Securityby CyberNewswire on January 20, 2026 at 9:29 am
Alisa Viejo, United States, 20th January 2026, CyberNewsWire
- Jordanian Man Pleads Guilty to Selling Stolen Logins for 50 Companiesby Waqas on January 19, 2026 at 7:45 pm
Jordanian man pleads guilty to selling stolen corporate logins in FBI sting after extradition from Georgia; tied to access of 50+ company networks.
- Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invitesby Deeba Ahmed on January 19, 2026 at 1:35 pm
Cybersecurity researchers at Miggo Security found a flaw in Google Gemini that uses calendar invites to steal private data. Learn how this silent attack bypasses security.
- Hackers Exploiting PDF24 App to Deploy Stealthy PDFSIDER Backdoorby Deeba Ahmed on January 19, 2026 at 12:17 pm
Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications.
Hack Read
We are an ethical website cyber security team and we perform security assessments to protect our clients.




