HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
Securing Agentic AI: How to Protect the Invisible Identity Access
AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive information…
July 15, 2025
  • Data Breaches

Securing Agentic AI: How to Protect the Invisible Identity Access

AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent…
July 15, 2025
  • Data Breaches

AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first…
July 15, 2025
  • Data Breaches

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set of…
July 15, 2025
  • Data Breaches

The Unusual Suspect: Git Repos

While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories leaking…
July 14, 2025
  • Data Breaches

⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

In cybersecurity, precision matters—and there’s little room for error. A small mistake, missed setting, or quiet misconfiguration can…
July 14, 2025
  • Data Breaches

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

India’s Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it said…
July 14, 2025
  • Data Breaches

eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in modern…
July 14, 2025
  • Data Breaches

GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs

NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of…
July 12, 2025
  • Data Breaches

Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub

Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain…
July 12, 2025

Posts pagination

1 2 … 39 Next
Featured Posts
  • State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

    July 15, 2025
  • Securing Agentic AI: How to Protect the Invisible Identity Access

    July 15, 2025
  • AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

    July 15, 2025
  • North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

    July 15, 2025
  • The Unusual Suspect: Git Repos

    July 14, 2025
Recent Posts
  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)

  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

Categories
  • Cyber Attacks (5)
  • Data Breaches (374)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0