HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations…
February 23, 2026
  • Data Breaches

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services…
February 21, 2026
  • Data Breaches

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that…
February 21, 2026
  • Data Breaches

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software…
February 21, 2026
  • Data Breaches

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications…
February 21, 2026
  • Data Breaches

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and…
February 20, 2026
  • Data Breaches

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated…
February 20, 2026
  • Data Breaches

Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing…
February 20, 2026
  • Data Breaches

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial…
February 19, 2026
  • Data Breaches

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million…
February 19, 2026

Posts pagination

1 2 … 94 Next
Featured Posts
  • MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

    February 23, 2026
  • AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

    February 21, 2026
  • Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

    February 21, 2026
  • CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

    February 21, 2026
  • EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

    February 21, 2026
Recent Posts
  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

  • ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

Categories
  • Cyber Attacks (5)
  • Data Breaches (927)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0