HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL.…
February 13, 2026
  • Data Breaches

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Several state-sponsored actors, hacktivist entities, and criminal groups from China, Iran, North Korea, and Russia have trained their…
February 13, 2026
  • Data Breaches

UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

A previously unknown threat actor tracked as UAT-9921 has been observed leveraging a new modular framework called VoidLink…
February 13, 2026
  • Data Breaches

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business…
February 13, 2026
  • Data Breaches

npm’s Update to Harden Their Supply Chain, and Points to Consider

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce…
February 13, 2026
  • Data Breaches

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial…
February 12, 2026
  • Data Breaches

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI)…
February 12, 2026
  • Data Breaches

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead…
February 12, 2026
  • Data Breaches

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming…
February 12, 2026
  • Data Breaches

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile…
February 12, 2026

Posts pagination

1 2 … 91 Next
Featured Posts
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    February 13, 2026
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    February 13, 2026
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    February 13, 2026
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    February 13, 2026
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    February 13, 2026
Recent Posts
  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Categories
  • Cyber Attacks (5)
  • Data Breaches (897)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0