HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including…
March 11, 2026
  • Data Breaches

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm…
March 11, 2026
  • Data Breaches

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data…
March 11, 2026
  • Data Breaches

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does…
March 10, 2026
  • Data Breaches

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW)…
March 10, 2026
  • Data Breaches

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Salesforce has warned of an increase in threat actor activity that’s aimed at exploiting misconfigurations in publicly accessible…
March 10, 2026
  • Data Breaches

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited…
March 10, 2026
  • Data Breaches

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote…
March 9, 2026
  • Data Breaches

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

The North Korean threat actor known as UNC4899 is suspected to be behind a sophisticated cloud compromise campaign…
March 9, 2026
  • Data Breaches

⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware

Another week in cybersecurity. Another week of “you’ve got to be kidding me.” Attackers were busy. Defenders were…
March 9, 2026

Posts pagination

1 2 … 100 Next
Featured Posts
  • Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

    March 11, 2026
  • UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

    March 11, 2026
  • Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

    March 11, 2026
  • How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

    March 10, 2026
  • FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

    March 10, 2026
Recent Posts
  • Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft

  • Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure

Categories
  • Cyber Attacks (5)
  • Data Breaches (992)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0