HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices
First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw…
February 12, 2026
  • Data Breaches

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the…
February 11, 2026
  • Data Breaches

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows…
February 11, 2026
  • Data Breaches

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

It’s Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting…
February 11, 2026
  • Data Breaches

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Intentionally vulnerable training applications are widely used for security education, internal testing, and product demonstrations. Tools such as…
February 11, 2026
  • Data Breaches

North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive…
February 11, 2026
  • Data Breaches

DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

The information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to…
February 10, 2026
  • Data Breaches

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools

Cybersecurity researchers have disclosed details of an emergent ransomware family dubbed Reynolds that comes embedded with a built-in…
February 10, 2026
  • Data Breaches

From Ransomware to Residency: Inside the Rise of the Digital Parasite

Are ransomware and encryption still the defining signals of modern cyberattacks, or has the industry been too fixated…
February 10, 2026
  • Data Breaches

Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

Fortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution…
February 10, 2026

Posts pagination

1 2 … 90 Next
Featured Posts
  • Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

    February 12, 2026
  • First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

    February 11, 2026
  • APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

    February 11, 2026
  • Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

    February 11, 2026
  • Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

    February 11, 2026
Recent Posts
  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (887)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0