Microsoft

DataBreachToday: Infostealers on the Loose

Cybercrime, Fraud Management & Cybercrime, Identity & Access Management Malware Captures Billions of Credentials Mathew J. Schwartz (euroinfosec) • October 24, 2025 Image: Shutterstock Credential theft via infostealers has escalated to alarming levels, as cybercriminals continuously adapt to enhanced security measures. By infiltrating corporate systems with malware that captures session…

Read MoreDataBreachToday: Infostealers on the Loose

Medusa Ransomware Exposes 834 GB of Comcast Data Following $1.2M Demand – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, and Crypto Updates

The Medusa ransomware group has publicly disclosed 186.36 GB of compressed data, which they allege was stolen from Comcast Corporation, a prominent global media and technology entity based in the United States. As highlighted in an earlier report by Hackread.com, the group claimed to have infiltrated Comcast in late September…

Read MoreMedusa Ransomware Exposes 834 GB of Comcast Data Following $1.2M Demand – Hackread – Your Source for Cybersecurity News, Data Breaches, Tech, AI, and Crypto Updates

U.S. Federal Agencies Directed to Address Hundreds of Actively Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has highlighted the urgent need for government agencies to address known cyber vulnerabilities. In a recent announcement, the agency published a comprehensive catalog containing vulnerabilities identified from major tech companies including Apple, Cisco, Microsoft, and Google. These vulnerabilities are…

Read MoreU.S. Federal Agencies Directed to Address Hundreds of Actively Exploited Vulnerabilities

Hackers Adapt and Innovate Their Strategies

Identity & Access Management, Security Operations Microsoft Warns of Hackers Shifting Focus to Identity Compromises Akshaya Asokan (asokan_akshaya) • October 22, 2025 Image: Shutterstock In its annual cybersecurity report, Microsoft has alerted businesses about a significant increase in identity-based attacks, emphasizing that hackers are now more likely to “log in”…

Read MoreHackers Adapt and Innovate Their Strategies

CISA Warns of Critical Exploitable Vulnerability in Windows SMB

Attack Surface Management, Security Operations Administering Response to NTLM Vulnerability Exploitation Greg Sirico • October 21, 2025 Image: Afansev Ivan/Shutterstock The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert regarding an actively exploited vulnerability in the Server Message Block (SMB) protocol. This flaw, identified as CVE-2025-33073, has…

Read MoreCISA Warns of Critical Exploitable Vulnerability in Windows SMB

Microsoft Addresses Security Vulnerabilities in AI, Cloud, and ERP Systems; One Being Actively Exploited

Microsoft has recently disclosed multiple security vulnerabilities affecting its AI, cloud services, enterprise resource planning systems, and Partner Center solutions. Among the vulnerabilities identified is a critical flaw that has already been exploited in the wild, raising alarms within the cybersecurity community. The most pressing concern is associated with a…

Read MoreMicrosoft Addresses Security Vulnerabilities in AI, Cloud, and ERP Systems; One Being Actively Exploited

Microsoft Takes Control of 42 Malicious Websites Operated by Chinese Hackers

Microsoft recently disclosed the successful seizure of 42 malicious domains linked to a China-based cyber espionage group, targeting organizations in the United States and 28 other nations. This operation followed a legal warrant issued by a federal court in Virginia, affirming the need to counteract these threats. The group, referred…

Read MoreMicrosoft Takes Control of 42 Malicious Websites Operated by Chinese Hackers

F5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Recent revelations in cybersecurity highlight the increasing prevalence of long-term breaches, which often go unnoticed until substantial damage is done. A striking example is the incident involving F5, a significant player in the application delivery and security space. On August 9, 2025, F5 announced that unidentified threat actors had infiltrated…

Read MoreF5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More