HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page

Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address…
August 29, 2025
  • Data Breaches

FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available

The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that…
August 29, 2025
  • Data Breaches

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across…
August 28, 2025
  • Data Breaches

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a…
August 28, 2025
  • Data Breaches

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks.…
August 28, 2025
  • Data Breaches

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers…
August 28, 2025
  • Data Breaches

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions…
August 28, 2025
  • Data Breaches

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude…
August 27, 2025
  • Data Breaches

ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government…
August 27, 2025
  • Data Breaches

The 5 Golden Rules of Safe AI Adoption

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace.…
August 27, 2025

Posts pagination

Previous 1 … 32 33 34 … 88 Next
Featured Posts
  • MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

    December 29, 2025
  • Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

    December 29, 2025
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
Recent Posts
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

Categories
  • Cyber Attacks (5)
  • Data Breaches (870)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0