hackers

20 Top-Level Domain Names Abused by Hackers in Phishing Attacks
Phishing attackers abuse TLDs like .li, .es, and .dev to hide redirects, steal credentials, and bypass detection. See top domains flagged by ANY.RUN in 2025. Some phishing sites don’t need fancy tricks, just the right domain name. And you won’t always spot it until it’s too late. Hackers have become masters at abusing certain Top-Level…

Exclusive: Hackers Leak 86 Million AT&T Records with Decrypted SSNs
Hackers have leaked what they claim is AT&T’s database which was reportedly stolen by the ShinyHunters group in April 2024 after they exploited major security flaws in the Snowflake cloud data platform. But is this really the Snowflake-linked data? We took a closer look. As seen by the Hackread.com research team, the data was first…

How Riot Games is fighting the war against video game hackers | TechCrunch
For as long as there have been video games, there have been people willing to find ways to cheat. Hobbyists have long dedicated themselves to finding vulnerabilities in games, often with the goal of developing cheats that they could share or sell. But ever since online competitive gaming became a legitimate profession, that hobby-hacking has…

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring process. “In this new campaign, the threat actor group is using three front companies in the cryptocurrency consulting industry—BlockNovas LLC (blocknovas[.] com), Angeloper Agency (angeloper[.]com), and SoftGlide LLC (softglide[.]co)—to spread malware via…

How Do Hackers Steal Credit Card Information? | TechTarget
Cybersecurity has never been more critical given the exponential growth of e-commerce and online transactions. Hackers may attempt to invade our privacy in several ways, but one area they find particularly enticing is credit card information. Stolen credit cards can negatively affect not just your finances but your personal identity and privacy, too. Protecting them…

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy malware over a three-month period from late 2024 through the beginning of 2025. The phishing campaigns adopting the strategy have been attributed to clusters tracked as TA427 (aka Kimsuky), TA450 (aka MuddyWater),…

The Most Dangerous People on the Internet in 2024
For its entire existence as a global medium, the internet’s evolution has been caught in a tug of war, pulled by opposing forces: on one side, moderation and control; on the other, disruption and anarchy. This year, the most prominent actors weighing in on the side of disruption were familiar faces: The reckless oligarchs, cybercriminals,…