HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit
Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions…
March 12, 2026
  • Data Breaches

Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised…
March 12, 2026
  • Data Breaches

CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to…
March 12, 2026
  • Data Breaches

Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf…
March 11, 2026
  • Data Breaches

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two…
March 11, 2026
  • Data Breaches

Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including…
March 11, 2026
  • Data Breaches

UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours

A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm…
March 11, 2026
  • Data Breaches

Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data…
March 11, 2026
  • Data Breaches

How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows

Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does…
March 10, 2026
  • Data Breaches

FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW)…
March 10, 2026

Posts pagination

1 2 … 101 Next
Featured Posts
  • Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

    March 12, 2026
  • Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets

    March 12, 2026
  • CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

    March 12, 2026
  • Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes

    March 11, 2026
  • Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

    March 11, 2026
Recent Posts
  • Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

  • CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Categories
  • Cyber Attacks (5)
  • Data Breaches (997)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0