HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Cybersecurity researchers have discovered a malicious Google Chrome extension that’s designed to steal data associated with Meta Business…
February 13, 2026
  • Data Breaches

npm’s Update to Harden Their Supply Chain, and Points to Consider

In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce…
February 13, 2026
  • Data Breaches

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial…
February 12, 2026
  • Data Breaches

Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Cybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI)…
February 12, 2026
  • Data Breaches

ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

Threat activity this week shows one consistent signal — attackers are leaning harder on what already works. Instead…
February 12, 2026
  • Data Breaches

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

A new 2026 market intelligence study of 128 enterprise security decision-makers (available here) reveals a stark divide forming…
February 12, 2026
  • Data Breaches

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile…
February 12, 2026
  • Data Breaches

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw…
February 12, 2026
  • Data Breaches

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the…
February 11, 2026
  • Data Breaches

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows…
February 11, 2026

Posts pagination

Previous 1 … 16 17 18 … 107 Next
Featured Posts
  • Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

    March 26, 2026
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

    March 26, 2026
  • WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

    March 26, 2026
  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

    March 25, 2026
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

    March 25, 2026
Recent Posts
  • FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

  • TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,055)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0