HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access
Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries
Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

A newly disclosed maximum-severity security flaw in Cisco Catalyst SD-WAN Controller (formerly vSmart) and Catalyst SD-WAN Manager (formerly…
February 26, 2026
  • Data Breaches

Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

Google on Wednesday disclosed that it worked with industry partners to disrupt the infrastructure of a suspected China-nexus…
February 25, 2026
  • Data Breaches

Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

Cybersecurity researchers have disclosed multiple security vulnerabilities in Anthropic’s Claude Code, an artificial intelligence (AI)-powered coding assistant, that…
February 25, 2026
  • Data Breaches

SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been observed offering financial incentives to recruit…
February 25, 2026
  • Data Breaches

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

Triage is supposed to make things simpler. In a lot of teams, it does the opposite. When you…
February 25, 2026
  • Data Breaches

Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker

A 39-year-old Australian national who was previously employed at U.S. defense contractor L3Harris has been sentenced to a…
February 25, 2026
  • Data Breaches

SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution

SolarWinds has released updates to address four critical security flaws in its Serv-U file transfer software that, if…
February 25, 2026
  • Data Breaches

CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed vulnerability in FileZen to…
February 25, 2026
  • Data Breaches

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by…
February 24, 2026
  • Data Breaches

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

A Russia-aligned threat actor has been observed targeting a European financial institution as part of a social engineering…
February 24, 2026

Posts pagination

1 2 … 95 Next
Featured Posts
  • Cisco SD-WAN Zero-Day CVE-2026-20127 Exploited Since 2023 for Admin Access

    February 26, 2026
  • Google Disrupts UNC2814 GRIDTIDE Campaign After 53 Breaches Across 42 Countries

    February 25, 2026
  • Claude Code Flaws Allow Remote Code Execution and API Key Exfiltration

    February 25, 2026
  • SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks

    February 25, 2026
  • Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

    February 25, 2026
Recent Posts
  • Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

  • APT28 Targeted European Entities Using Webhook-Based Macro Malware

Categories
  • Cyber Attacks (5)
  • Data Breaches (942)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0