HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.…
November 27, 2025
  • Data Breaches

Shai-Hulud v2 Spreads From npm to Maven, as Campaign Exposes Thousands of Secrets

The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after compromising…
November 26, 2025
  • Data Breaches

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heist

South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack…
November 26, 2025
  • Data Breaches

When Your $2M Security Detection Fails: Can your SOC Save You?

Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment…
November 26, 2025
  • Data Breaches

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a…
November 26, 2025
  • Data Breaches

Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Tools

If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms…
November 26, 2025
  • Data Breaches

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a…
November 26, 2025
  • Data Breaches

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake…
November 25, 2025
  • Data Breaches

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email…
November 25, 2025
  • Data Breaches

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making…
November 25, 2025

Posts pagination

Previous 1 … 11 12 13 … 91 Next
Featured Posts
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    February 13, 2026
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    February 13, 2026
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    February 13, 2026
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    February 13, 2026
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    February 13, 2026
Recent Posts
  • Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

  • Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Categories
  • Cyber Attacks (5)
  • Data Breaches (897)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0