HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access
Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability

Microsoft has released security fixes to address a massive set of 126 flaws affecting its software products, including…
April 9, 2025
  • Data Breaches

Agentic AI in the SOC – Dawn of Autonomous Alert Triage

Security Operations Centers (SOCs) today face unprecedented alert volumes and increasingly sophisticated threats. Triaging and investigating these alerts…
April 8, 2025
  • Data Breaches

UAC-0226 Deploys GIFTEDCROOK Stealer via Malicious Excel Files Targeting Ukraine

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed a new set of cyber attacks targeting Ukrainian…
April 8, 2025
  • Data Breaches

CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation

A recently disclosed critical security flaw impacting CrushFTP has been added by the U.S. Cybersecurity and Infrastructure Security…
April 8, 2025
  • Data Breaches

Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities

Google has shipped patches for 62 vulnerabilities, two of which it said have been exploited in the wild.…
April 8, 2025
  • Data Breaches

CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks

Cybersecurity agencies from Australia, Canada, New Zealand, and the United States have published a joint advisory about the…
April 7, 2025
  • Data Breaches

⚡ Weekly Recap: VPN Exploits, Oracle’s Silent Breach, ClickFix Comeback and More

Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep…
April 7, 2025
  • Data Breaches

Security Theater: Vanity Metrics Keep You Busy – and Exposed

After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500…
April 7, 2025
  • Data Breaches

PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks

A malicious campaign dubbed PoisonSeed is leveraging compromised credentials associated with customer relationship management (CRM) tools and bulk…
April 7, 2025
  • Data Breaches

Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws

A likely lone wolf actor behind the EncryptHub persona was acknowledged by Microsoft for discovering and reporting two…
April 5, 2025

Posts pagination

Previous 1 … 107 108 109 … 111 Next
Featured Posts
  • CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

    May 22, 2026
  • Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access

    May 22, 2026
  • Showboat Linux Malware Hits Middle East Telecom with SOCKS5 Proxy Backdoor

    May 21, 2026
  • ThreatsDay Bulletin: Linux Rootkits, Router 0-Day, AI Intrusions, Scam Kits and 25 New Stories

    May 21, 2026
  • Microsoft Warns of Two Actively Exploited Defender Vulnerabilities

    May 21, 2026
Recent Posts
  • China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing

  • Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,095)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0