HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
We Are At War
Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware
LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools

A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an…
November 7, 2025
  • Data Breaches

Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation

A set of nine malicious NuGet packages has been identified as capable of dropping time-delayed payloads to sabotage…
November 7, 2025
  • Data Breaches

Enterprise Credentials at Risk – Same Old, Same Old?

Imagine this: Sarah from accounting gets what looks like a routine password reset email from your organization’s cloud…
November 7, 2025
  • Data Breaches

Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts

Google on Thursday said it’s rolling out a dedicated form to allow businesses listed on Google Maps to…
November 7, 2025
  • Data Breaches

Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities

Cybersecurity researchers have flagged a malicious Visual Studio Code (VS Code) extension with basic ransomware capabilities that appears…
November 7, 2025
  • Data Breaches

Trojanized ESET Installers Drop Kalambur Backdoor in Phishing Attacks on Ukraine

A previously unknown threat activity cluster has been observed impersonating Slovak cybersecurity company ESET as part of phishing…
November 6, 2025
  • Data Breaches

From Tabletop to Turnkey: Building Cyber Resilience in Financial Services

Introduction Financial institutions are facing a new reality: cyber-resilience has passed from being a best practice, to an…
November 6, 2025
  • Data Breaches

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

Cybercrime has stopped being a problem of just the internet — it’s becoming a problem of the real…
November 6, 2025
  • Data Breaches

Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response

Bitdefender has once again been recognized as a Representative Vendor in the Gartner® Market Guide for Managed Detection…
November 6, 2025
  • Data Breaches

Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection

The threat actor known as Curly COMrades has been observed exploiting virtualization technologies as a way to bypass…
November 6, 2025

Posts pagination

Previous 1 … 34 35 36 … 107 Next
Featured Posts
  • We Are At War

    March 27, 2026
  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

    March 27, 2026
  • LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks

    March 27, 2026
  • China-Linked Red Menshen Uses Stealthy BPFDoor Implants to Spy via Telecom Networks

    March 26, 2026
  • Coruna iOS Kit Reuses 2023 Triangulation Exploit Code in New Mass Attacks

    March 26, 2026
Recent Posts
  • [Webinar] Stop Guessing. Learn to Validate Your Defenses Against Real Attacks

  • WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce Sites

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,059)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0