HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing…
February 20, 2026
  • Data Breaches

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial…
February 19, 2026
  • Data Breaches

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million…
February 19, 2026
  • Data Breaches

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate…
February 19, 2026
  • Data Breaches

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new…
February 19, 2026
  • Data Breaches

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests…
February 19, 2026
  • Data Breaches

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool…
February 18, 2026
  • Data Breaches

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could…
February 18, 2026
  • Data Breaches

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that,…
February 18, 2026
  • Data Breaches

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the…
February 18, 2026

Posts pagination

1 2 … 93 Next
Featured Posts
  • Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

    February 20, 2026
  • PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

    February 19, 2026
  • INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

    February 19, 2026
  • Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

    February 19, 2026
  • ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

    February 19, 2026
Recent Posts
  • Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

  • CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

Categories
  • Cyber Attacks (5)
  • Data Breaches (920)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0