<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hackread &#8211; Cybersecurity News, Data Breaches, AI and More</title>
	<atom:link href="https://hackread.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://hackread.com</link>
	<description></description>
	<lastBuildDate>Wed, 15 Apr 2026 11:55:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://hackread.com/wp-content/uploads/2023/08/cropped-HACKREAD-32x32.png</url>
	<title>Hackread &#8211; Cybersecurity News, Data Breaches, AI and More</title>
	<link>https://hackread.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>ShinyHunters Leak Rockstar Games Data, No Player Records Impacted</title>
		<link>https://hackread.com/shinyhunters-leak-rockstar-games-data-player-records/</link>
					<comments>https://hackread.com/shinyhunters-leak-rockstar-games-data-player-records/#respond</comments>
		
		<dc:creator><![CDATA[Waqas]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 11:55:37 +0000</pubDate>
				<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Leaks]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[gaming]]></category>
		<category><![CDATA[Rockstar Games]]></category>
		<category><![CDATA[ShinyHunters]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143884</guid>

					<description><![CDATA[ShinyHunters hackers leak 7.54 GB of Rockstar Games data from Snowflake analytics systems, confirming no player records or personal information were exposed.]]></description>
		
					<wfw:commentRss>https://hackread.com/shinyhunters-leak-rockstar-games-data-player-records/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds</title>
		<link>https://hackread.com/botnet-device-drives-2-tbps-ddos-attacks-fintech/</link>
					<comments>https://hackread.com/botnet-device-drives-2-tbps-ddos-attacks-fintech/#respond</comments>
		
		<dc:creator><![CDATA[Deeba Ahmed]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 09:58:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Betting]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DDOS]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Qrator]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143887</guid>

					<description><![CDATA[A new Qrator Labs report reveals that the largest DDoS botnet has grown to 13.5 million devices, and&#8230;]]></description>
		
					<wfw:commentRss>https://hackread.com/botnet-device-drives-2-tbps-ddos-attacks-fintech/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows</title>
		<link>https://hackread.com/active-hanghost-loader-payment-logistic-workflow/</link>
					<comments>https://hackread.com/active-hanghost-loader-payment-logistic-workflow/#respond</comments>
		
		<dc:creator><![CDATA[Owais Sultan]]></dc:creator>
		<pubDate>Wed, 15 Apr 2026 08:36:40 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[ANY RUN]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[HanGhost Loader]]></category>
		<category><![CDATA[Logistics]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143924</guid>

					<description><![CDATA[Active HanGhost Loader campaign targets enterprise payment and logistics workflows with fileless attacks, multi-stage execution, and stealthy malware delivery.]]></description>
		
					<wfw:commentRss>https://hackread.com/active-hanghost-loader-payment-logistic-workflow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How Digital Annotations Are Replacing Paper Markups in Business</title>
		<link>https://hackread.com/digital-annotations-replace-paper-markups-business/</link>
					<comments>https://hackread.com/digital-annotations-replace-paper-markups-business/#respond</comments>
		
		<dc:creator><![CDATA[Owais Sultan]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 21:01:56 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Annotation]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143916</guid>

					<description><![CDATA[Digital Annotations replace paper markups in business, enabling real time collaboration, version control, and secure document workflows across teams.]]></description>
		
					<wfw:commentRss>https://hackread.com/digital-annotations-replace-paper-markups-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now</title>
		<link>https://hackread.com/wolfssl-vulnerability-iot-routers-military-systems/</link>
					<comments>https://hackread.com/wolfssl-vulnerability-iot-routers-military-systems/#respond</comments>
		
		<dc:creator><![CDATA[Deeba Ahmed]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 18:30:42 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[wolfSSL]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143895</guid>

					<description><![CDATA[Critical wolfSSL flaw CVE-2026-5194 allows digital ID forgery across billions of devices, update to version 5.9.1 to fix the issue and reduce risk.]]></description>
		
					<wfw:commentRss>https://hackread.com/wolfssl-vulnerability-iot-routers-military-systems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Risk Advisors Purple Team Participants Can Now Earn CPE Credits</title>
		<link>https://hackread.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/</link>
					<comments>https://hackread.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/#respond</comments>
		
		<dc:creator><![CDATA[CyberNewswire]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 17:40:30 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[MITRE]]></category>
		<category><![CDATA[Simulation]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143909</guid>

					<description><![CDATA[Philadelphia, United States / Pennsylvania, 14th April 2026, CyberNewswire]]></description>
		
					<wfw:commentRss>https://hackread.com/security-risk-advisors-purple-team-participants-can-now-earn-cpe-credits/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kraken Exchange Faces Extortion After Insider Recorded System Footage</title>
		<link>https://hackread.com/kraken-exchange-extortion-insider-system-footage/</link>
					<comments>https://hackread.com/kraken-exchange-extortion-insider-system-footage/#respond</comments>
		
		<dc:creator><![CDATA[Deeba Ahmed]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 15:58:05 +0000</pubDate>
				<category><![CDATA[Cyber Crime]]></category>
		<category><![CDATA[Crypto]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Extortion]]></category>
		<category><![CDATA[Insider Threat]]></category>
		<category><![CDATA[Kraken]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143876</guid>

					<description><![CDATA[Kraken exchange faces extortion after a staff member misused access to record internal systems, about 2,000 accounts affected, no funds or systems breached.]]></description>
		
					<wfw:commentRss>https://hackread.com/kraken-exchange-extortion-insider-system-footage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Booking.com Confirms Data Breach as Hackers Access Customer Details</title>
		<link>https://hackread.com/booking-com-data-breach-hackers-customer-details/</link>
					<comments>https://hackread.com/booking-com-data-breach-hackers-customer-details/#respond</comments>
		
		<dc:creator><![CDATA[Waqas]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 11:28:40 +0000</pubDate>
				<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Booking.com]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143875</guid>

					<description><![CDATA[Booking.com confirms a data breach exposing customer details to hackers. No payment data accessed, but users face risk of targeted phishing scams now!]]></description>
		
					<wfw:commentRss>https://hackread.com/booking-com-data-breach-hackers-customer-details/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses</title>
		<link>https://hackread.com/ransomware-vipertunnel-malware-uk-us-businesses/</link>
					<comments>https://hackread.com/ransomware-vipertunnel-malware-uk-us-businesses/#respond</comments>
		
		<dc:creator><![CDATA[Deeba Ahmed]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 10:02:28 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[InfoGuard]]></category>
		<category><![CDATA[ViperTunnel]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143856</guid>

					<description><![CDATA[ViperTunnel is a Python-based backdoor linked to DragonForce ransomware that targets businesses using Windows servers across the US and the UK.]]></description>
		
					<wfw:commentRss>https://hackread.com/ransomware-vipertunnel-malware-uk-us-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>OpenAI Rotates macOS Certificates Following Axios Supply Chain Breach</title>
		<link>https://hackread.com/openai-macos-certificates-axios-supply-chain-breach/</link>
					<comments>https://hackread.com/openai-macos-certificates-axios-supply-chain-breach/#respond</comments>
		
		<dc:creator><![CDATA[Deeba Ahmed]]></dc:creator>
		<pubDate>Mon, 13 Apr 2026 20:11:47 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Axios]]></category>
		<category><![CDATA[ChatGPT]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[macOS]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[OpenAI]]></category>
		<category><![CDATA[Supply Chain Attack]]></category>
		<category><![CDATA[UNC1069]]></category>
		<guid isPermaLink="false">https://hackread.com/?p=143851</guid>

					<description><![CDATA[OpenAI rotates macOS certificates after downloading a compromised Axios version, urging users to update apps before revoked certificates are blocked in May 2026.]]></description>
		
					<wfw:commentRss>https://hackread.com/openai-macos-certificates-axios-supply-chain-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
