HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests…
February 19, 2026
  • Data Breaches

Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody

New research from the Citizen Lab has found signs that Kenyan authorities used a commercial forensic extraction tool…
February 18, 2026
  • Data Breaches

Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution

Cybersecurity researchers have disclosed a critical security flaw in the Grandstream GXP1600 series of VoIP phones that could…
February 18, 2026
  • Data Breaches

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

Cybersecurity researchers have disclosed multiple security vulnerabilities in four popular Microsoft Visual Studio Code (VS Code) extensions that,…
February 18, 2026
  • Data Breaches

Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability

In 2025, navigating the digital seas still felt like a matter of direction. Organizations charted routes, watched the…
February 18, 2026
  • Data Breaches

Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware

Notepad++ has released a security fix to plug gaps that were exploited by an advanced threat actor from…
February 18, 2026
  • Data Breaches

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited…
February 18, 2026
  • Data Breaches

Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster

Cloud attacks move fast — faster than most incident response teams. In data centers, investigations had time. Teams…
February 17, 2026
  • Data Breaches

Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies

Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing or URL fetching capabilities can…
February 17, 2026
  • Data Breaches

Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates

A new Android backdoor that’s embedded deep into the device firmware can silently harvest data and remotely control…
February 17, 2026

Posts pagination

Previous 1 … 14 15 16 … 107 Next
Featured Posts
  • Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

    March 26, 2026
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

    March 26, 2026
  • WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

    March 26, 2026
  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

    March 25, 2026
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

    March 25, 2026
Recent Posts
  • FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

  • TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,055)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0