HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
APT28 Targeted European Entities Using Webhook-Based Macro Malware
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence (AI) companies, DeepSeek, Moonshot AI,…
February 24, 2026
  • Data Breaches

APT28 Targeted European Entities Using Webhook-Based Macro Malware

The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a new campaign targeting specific entities…
February 23, 2026
  • Data Breaches

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to…
February 23, 2026
  • Data Breaches

⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

Security news rarely moves in a straight line. This week, it feels more like a series of sharp…
February 23, 2026
  • Data Breaches

How Exposed Endpoints Increase Risk Across LLM Infrastructure

As more organizations run their own Large Language Models (LLMs), they are also deploying more internal services and…
February 23, 2026
  • Data Breaches

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm, and MUDDYCOAST) has targeted several organizations…
February 23, 2026
  • Data Breaches

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services…
February 21, 2026
  • Data Breaches

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that…
February 21, 2026
  • Data Breaches

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software…
February 21, 2026
  • Data Breaches

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications…
February 21, 2026

Posts pagination

1 2 … 94 Next
Featured Posts
  • Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

    February 24, 2026
  • APT28 Targeted European Entities Using Webhook-Based Macro Malware

    February 23, 2026
  • Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

    February 23, 2026
  • ⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More

    February 23, 2026
  • How Exposed Endpoints Increase Risk Across LLM Infrastructure

    February 23, 2026
Recent Posts
  • BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

  • Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

Categories
  • Cyber Attacks (5)
  • Data Breaches (932)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0