News
EU Launches GCVE to Track Vulnerabilities Without Relying on US
1+ hour, 34+ min ago (569+ words) For a long time, the world has depended on a US-based program called CVE (Common Vulnerabilities and Exposures) to name and track online threats. However, earlier concerns that the US system might be discontinued in 2025 sent a "brief scare" through…...
Sprocket Security Appoints Eric Sheridan as Chief Technology Officer
2+ hour, 52+ min ago (301+ words) Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread Sprocket Security Appoints Eric Sheridan as Chief Technology Officer Madison, United States, January 20th, 2026, CyberNewsWire Veteran cybersecurity leader brings decades of experience and patented innovation to advance the next generation of…...
Hackathon Projects Show AI Wellness Apps Can Leak Sensitive User Info
4+ hour, 44+ min ago (917+ words) Standard marketing tools accessed data that should never have been accessible in that context. The developers didn't think through what those pixels could reach in a mental health application. This pattern is accelerating. AI wellness companions, digital journals that analyze…...
One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security
8+ hour, 45+ min ago (367+ words) Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread One Identity Unveils Major Upgrade to Identity Manager, Strengthening Enterprise Identity Security Alisa Viejo, United States, January 20th, 2026, CyberNewsWire One Identity, a trusted leader in identity security, today announces a major…...
Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites
1+ day, 4+ hour ago (296+ words) AI assistants are built to make life easier, but a new discovery shows that even a simple meeting invite can be turned into a Trojan Horse. Researchers at Miggo Security found a scary flaw in how Google Gemini interacts with…...
How 2 Missing Characters Nearly Compromised AWS
4+ day, 2+ hour ago (419+ words) A massive security hole that could have given hackers total control over Amazon Web Services (AWS) was recently fixed before anyone could actually use it for harm. The discovery, made by Wiz Research, prevented what they called a "historic near…...
GhostPoster Browser Malware Hid for 5 Years With 840,000 Installs
5+ day, 1+ hour ago (363+ words) What started as a single suspicious browser add-on has grown into a much larger cybersecurity concern that many users never saw coming. Last month, Koi Security published an analysis of a Firefox extension it named GhostPoster, describing a method of…...
BreachLock Expands Adversarial Exposure Validation (AEV) to Web Applications
5+ day, 2+ hour ago (238+ words) New York, United States, January 15th, 2026, CyberNewsWire BreachLock, a global leader in offensive security, today announced that its Adversarial Exposure Validation (AEV) solution now supports autonomous red teaming at the application layer, expanding beyond its initial network-layer capabilities introduced in early…...
AppGuard Critiques AI Hyped Defenses; Expands its Insider Release for its Next-Generation Platform
5+ day, 3+ hour ago (347+ words) A new Top 10 Cybersecurity Innovators profile by AppGuard has been released, spotlighting growing concerns over AI-enhanced malware. AI makes malware even more difficult to detect. Worse, they use AI to assess, adapt, and move faster than any cyber stack can…...
New CastleLoader Variant Linked to 469 Infections Across Critical Sectors
5+ day, 5+ hour ago (338+ words) A new name is surfacing in cyber intelligence reports that has security teams on edge. Known as CastleLoader, it has become a go-to tool for attackers targeting high-security environments since early 2025. As Hackread.com reported in December 2025, earlier versions of…...