HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data
GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs
Browser Extensions Are the New AI Consumption Channel That No One Is Talking About
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been…
April 11, 2026
  • Data Breaches

GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that’s…
April 10, 2026
  • Data Breaches

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there’s a wide-open window nobody’s…
April 10, 2026
  • Data Breaches

Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

Google has made Device Bound Session Credentials (DBSC) generally available to all Windows users of its Chrome web browser, months…
April 10, 2026
  • Data Breaches

Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

A critical security vulnerability in Marimo, an open-source Python notebook for data science and analysis, has been exploited within…
April 10, 2026
  • Data Breaches

Backdoored Smart Slider 3 Pro Update Distributed via Compromised Nextend Servers

Unknown threat actors have hijacked the update system for the Smart Slider 3 Pro plugin for WordPress and…
April 10, 2026
  • Data Breaches

EngageLab SDK Flaw Exposed 50M Android Users, Including 30M Crypto Wallet Installs

Details have emerged about a now-patched security vulnerability in a widely used third-party Android software development kit (SDK) called EngageLab SDK…
April 9, 2026
  • Data Breaches

The Hidden Security Risks of Shadow AI in Enterprises

As AI tools become more accessible, employees are adopting them without formal approval from IT and security teams. While these…
April 9, 2026
  • Data Breaches

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents…
April 9, 2026
  • Data Breaches

Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region

An apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists,…
April 9, 2026

Posts pagination

1 2 … 113 Next
Featured Posts
  • Citizen Lab: Law Enforcement Used Webloc to Track 500 Million Devices via Ad Data

    April 11, 2026
  • GlassWorm Campaign Uses Zig Dropper to Infect Multiple Developer IDEs

    April 10, 2026
  • Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

    April 10, 2026
  • Google Rolls Out DBSC in Chrome 146 to Block Session Theft on Windows

    April 10, 2026
  • Marimo RCE Flaw CVE-2026-39987 Exploited Within 10 Hours of Disclosure

    April 10, 2026
Recent Posts
  • New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy

  • Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,118)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0