HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

Cybersecurity researchers have flagged malicious Packagist PHP packages masquerading as Laravel utilities that act as a conduit for…
March 4, 2026
  • Data Breaches

APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

Cybersecurity researchers have disclosed details of an advanced persistent threat (APT) group dubbed Silver Dragon that has been…
March 4, 2026
  • Data Breaches

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom…
March 4, 2026
  • Data Breaches

Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake…
March 3, 2026
  • Data Breaches

Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats…
March 3, 2026
  • Data Breaches

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft on Monday warned of phishing campaigns that employ phishing emails and OAuth URL redirection mechanisms to bypass…
March 3, 2026
  • Data Breaches

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Google on Monday disclosed that a high-severity security flaw impacting an open-source Qualcomm component used in Android devices…
March 3, 2026
  • Data Breaches

SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains

The threat activity cluster known as SloppyLemming has been attributed to a fresh set of attacks targeting government…
March 3, 2026
  • Data Breaches

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Cybersecurity researchers have disclosed details of a now-patched security flaw in Google Chrome that could have permitted attackers…
March 2, 2026
  • Data Breaches

Google Develops Merkle Tree Certificates to Enable Quantum-Resistant HTTPS in Chrome

Google has announced a new program in its Chrome browser to ensure that HTTPS certificates are secure against…
March 2, 2026

Posts pagination

1 2 … 98 Next
Featured Posts
  • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    March 4, 2026
  • APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

    March 4, 2026
  • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026
  • Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

    March 3, 2026
Recent Posts
  • North Korean Hackers Publish 26 npm Packages Hiding Pastebin C2 for Cross-Platform RAT

  • ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

Categories
  • Cyber Attacks (5)
  • Data Breaches (964)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0