HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
The State of Trusted Open Source Report
WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs) and cryptocurrency miners since…
April 2, 2026
  • Data Breaches

The State of Trusted Open Source Report

In December 2025, we shared the first-ever The State of Trusted Open Source report, featuring insights from our product data…
April 2, 2026
  • Data Breaches

WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

Meta-owned messaging platform WhatsApp said it alerted about 200 users who were tricked into installing a bogus version…
April 2, 2026
  • Data Breaches

Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

Apple on Wednesday expanded the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader range of devices to protect users from…
April 2, 2026
  • Data Breaches

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which…
April 1, 2026
  • Data Breaches

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on…
April 1, 2026
  • Data Breaches

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Google has formally attributed the supply chain compromise of the popular Axios npm package to a financially motivated…
April 1, 2026
  • Data Breaches

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Anthropic on Tuesday confirmed that internal code for its popular artificial intelligence (AI) coding assistant, Claude Code, had…
April 1, 2026
  • Data Breaches

Android Developer Verification Rollout Begins Ahead of September Enforcement

Google on Monday said it’s officially rolling out Android developer verification to all developers to combat the problem…
March 31, 2026
  • Data Breaches

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

A high-severity security flaw in the TrueConf client video conferencing software has been exploited in the wild as…
March 31, 2026

Posts pagination

1 2 … 110 Next
Featured Posts
  • Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners

    April 2, 2026
  • The State of Trusted Open Source Report

    April 2, 2026
  • WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action

    April 2, 2026
  • Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit

    April 2, 2026
  • CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

    April 1, 2026
Recent Posts
  • Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

  • OpenAI Patches ChatGPT Data Exfiltration Flaw and Codex GitHub Token Vulnerability

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,083)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0