HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible…
March 10, 2026
  • Data Breaches

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited…
March 10, 2026
  • Data Breaches

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote…
March 9, 2026
  • Data Breaches

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign…
March 9, 2026
  • Data Breaches

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Another week in cybersecurity. Another week of “you’ve got to be kidding me.” Attackers were busy. Defenders were…
March 9, 2026
  • Data Breaches

Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

Two Google Chrome extensions have turned malicious after what appears to be a case of ownership transfer, offering…
March 9, 2026
  • Data Breaches

Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

High-value organizations located in South, Southeast, and East Asia have been targeted by a Chinese threat actor as…
March 9, 2026
  • Data Breaches

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that’s designed to find,…
March 7, 2026
  • Data Breaches

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of…
March 7, 2026
  • Data Breaches

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence…
March 6, 2026

Posts pagination

1 2 … 100 Next
Featured Posts
  • Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

    March 10, 2026
  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

    March 10, 2026
  • Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

    March 9, 2026
  • UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

    March 9, 2026
  • ⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

    March 9, 2026
Recent Posts
  • Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

  • The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

Categories
  • Cyber Attacks (5)
  • Data Breaches (987)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0