HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks
[Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks
WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security…
November 21, 2025
  • Data Breaches

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected to the platform. “Our investigation indicates…
November 21, 2025
  • Data Breaches

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

This week has been crazy in the world of hacking and online security. From Thailand to London to…
November 20, 2025
  • Data Breaches

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide via a network of deceptive authentication…
November 20, 2025
  • Data Breaches

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus that enables credential theft and…
November 20, 2025
  • Data Breaches

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Threat actors with ties to Iran engaged in cyber warfare as part of efforts to facilitate and enhance…
November 20, 2025
  • Data Breaches

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

Threat actors are leveraging bogus installers masquerading as popular software to trick users into installing malware as part…
November 20, 2025
  • Data Breaches

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly…
November 19, 2025
  • Data Breaches

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional…
November 19, 2025
  • Data Breaches

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper…
November 19, 2025

Posts pagination

Previous 1 … 29 30 31 … 107 Next
Featured Posts
  • Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

    March 26, 2026
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

    March 26, 2026
  • WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

    March 26, 2026
  • LeakBase Admin Arrested in Russia Over Massive Stolen Credential Marketplace

    March 25, 2026
  • GlassWorm Malware Uses Solana Dead Drops to Deliver RAT and Steal Browser, Crypto Data

    March 25, 2026
Recent Posts
  • FCC Bans New Foreign-Made Routers Over Supply Chain and Cyber Risk Concerns

  • TeamPCP Backdoors LiteLLM Versions 1.82.7–1.82.8 via Trivy CI/CD Compromise

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,055)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0