HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET,…
December 24, 2025
  • Data Breaches

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

Every year, cybercriminals find new ways to steal money and data from businesses. Breaching a business network, extracting…
December 24, 2025
  • Data Breaches

SEC Files Charges Over $14 Million Crypto Scam Using Fake AI-Themed Investment Tips

The U.S. Securities and Exchange Commission (SEC) has filed charges against multiple companies for their alleged involvement in…
December 24, 2025
  • Data Breaches

Italy Fines Apple €98.6 Million Over ATT Rules Limiting App Store Competition

Apple has been fined €98.6 million ($116 million) by Italy’s antitrust authority after finding that the company’s App…
December 24, 2025
  • Data Breaches

Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same…
December 23, 2025
  • Data Breaches

INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

A law enforcement operation coordinated by INTERPOL has led to the recovery of $3 million and the arrest…
December 23, 2025
  • Data Breaches

Passwd: A walkthrough of the Google Workspace Password Manager

Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password…
December 23, 2025
  • Data Breaches

U.S. DoJ Seizes Fraud Domain Behind $14.6 Million Bank Account Takeover Scheme

The U.S. Justice Department (DoJ) on Monday announced the seizure of a web domain and database that it…
December 23, 2025
  • Data Breaches

Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances

A critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could…
December 23, 2025
  • Data Breaches

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

The U.S. Federal Communications Commission (FCC) on Monday announced a ban on all drones and critical components made…
December 23, 2025

Posts pagination

Previous 1 2 3 4 … 89 Next
Featured Posts
  • Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    February 10, 2026
  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

    February 9, 2026
  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

    February 9, 2026
  • ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

    February 9, 2026
  • How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    February 9, 2026
Recent Posts
  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

Categories
  • Cyber Attacks (5)
  • Data Breaches (878)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0