HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Android Trojan ‘Fantasy Hub’ Malware Service Turns Telegram Into a Hub for Hackers

Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that’s sold…
November 11, 2025
  • Data Breaches

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s…
November 10, 2025
  • Data Breaches

Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon

The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has…
November 10, 2025
  • Data Breaches

⚡ Weekly Recap: Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

Cyber threats didn’t slow down last week—and attackers are getting smarter. We’re seeing malware hidden in virtual machines,…
November 10, 2025
  • Data Breaches

New Browser Security Report Reveals Emerging Threats for Enterprises

According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related…
November 10, 2025
  • Data Breaches

Large-Scale ClickFix Phishing Attacks Target Hotel Systems with PureRAT Malware

Cybersecurity researchers have called attention to a massive phishing campaign targeting the hospitality industry that lures hotel managers…
November 10, 2025
  • Data Breaches

GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs

Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts…
November 10, 2025
  • Data Breaches

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive…
November 8, 2025
  • Data Breaches

Samsung Mobile Flaw Exploited as Zero-Day to Deploy LANDFALL Android Spyware

A now-patched security flaw in Samsung Galaxy Android devices was exploited as a zero-day to deliver a “commercial-grade”…
November 7, 2025
  • Data Breaches

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an…
November 7, 2025

Posts pagination

Previous 1 … 17 18 19 … 91 Next
Featured Posts
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    February 13, 2026
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    February 13, 2026
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    February 13, 2026
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    February 13, 2026
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    February 13, 2026
Recent Posts
  • Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

  • Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Categories
  • Cyber Attacks (5)
  • Data Breaches (897)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0