HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques…
April 23, 2025
  • Data Breaches

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights…
April 23, 2025
  • Data Breaches

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a previously undocumented technique to mine…
April 22, 2025
  • Data Breaches

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker…
April 22, 2025
  • Data Breaches

5 Major Concerns With Employees Using The Browser

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However,…
April 22, 2025
  • Data Breaches

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach…
April 22, 2025
  • Data Breaches

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual…
April 22, 2025
  • Data Breaches

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as…
April 21, 2025
  • Data Breaches

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling cybercriminals…
April 21, 2025
  • Data Breaches

5 Reasons Device Management Isn’t Device Trust​

The problem is simple: all breaches start with initial access, and initial access comes down to two primary…
April 21, 2025

Posts pagination

Previous 1 … 101 102 103 … 110 Next
Featured Posts
  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

    April 3, 2026
  • Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

    April 3, 2026
  • UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

    April 3, 2026
  • Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture

    April 3, 2026
  • New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images

    April 3, 2026
Recent Posts
  • Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK

  • Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,090)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0