HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

OpenAI on Friday began rolling out Codex Security, an artificial intelligence (AI)-powered security agent that’s designed to find,…
March 7, 2026
  • Data Breaches

Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

Anthropic on Friday said it discovered 22 new security vulnerabilities in the Firefox web browser as part of…
March 7, 2026
  • Data Breaches

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

The Pakistan-aligned threat actor known as Transparent Tribe has become the latest hacking group to embrace artificial intelligence…
March 6, 2026
  • Data Breaches

Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to…
March 6, 2026
  • Data Breaches

The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

Scaling cybersecurity services as an MSP or MSSP requires technical expertise and a business model that delivers measurable…
March 6, 2026
  • Data Breaches

Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor

New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking…
March 6, 2026
  • Data Breaches

China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks

A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications infrastructure in South America since 2024,…
March 6, 2026
  • Data Breaches

Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer

Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering campaign that has leveraged the Windows…
March 6, 2026
  • Data Breaches

Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Hikvision and Rockwell…
March 6, 2026
  • Data Breaches

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

Most organizations assume encrypted data is safe. But many attackers are already preparing for a future where today’s…
March 5, 2026

Posts pagination

1 2 … 99 Next
Featured Posts
  • OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues

    March 7, 2026
  • Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model

    March 7, 2026
  • Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

    March 6, 2026
  • Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT

    March 6, 2026
  • The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity

    March 6, 2026
Recent Posts
  • Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities

  • Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks

Categories
  • Cyber Attacks (5)
  • Data Breaches (980)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0