HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
The Hidden Cost of Recurring Credential Incidents
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

In the rapid evolution of the 2026 threat landscape, a frustrating paradox has emerged for CISOs and security leaders: Identity programs…
April 7, 2026
  • Data Breaches

The Hidden Cost of Recurring Credential Incidents

When talking about credential security, the focus usually lands on breach prevention. This makes sense when IBM’s 2025 Cost of…
April 7, 2026
  • Data Breaches

New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

New academic research has identified multiple RowHammer attacks against high-performance graphics processing units (GPUs) that could be exploited…
April 7, 2026
  • Data Breaches

China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

A China-based threat actor known for deploying Medusa ransomware has been linked to the weaponization of a combination of…
April 7, 2026
  • Data Breaches

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

Threat actors are exploiting a maximum-severity security flaw in Flowise, an open-source artificial intelligence (AI) platform, according to…
April 7, 2026
  • Data Breaches

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers

The most active piece of enterprise infrastructure in the company is the developer workstation. That laptop is where credentials are…
April 6, 2026
  • Data Breaches

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence…
April 6, 2026
  • Data Breaches

BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks

Germany’s Federal Criminal Police Office (aka BKA or the Bundeskriminalamt) has unmasked the real identities of two of…
April 6, 2026
  • Data Breaches

$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation

Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of…
April 5, 2026
  • Data Breaches

36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants

Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins…
April 5, 2026

Posts pagination

1 2 … 111 Next
Featured Posts
  • [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

    April 7, 2026
  • The Hidden Cost of Recurring Credential Incidents

    April 7, 2026
  • New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips

    April 7, 2026
  • China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware

    April 7, 2026
  • Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed

    April 7, 2026
Recent Posts
  • Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,101)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0