HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a…
August 28, 2025
  • Data Breaches

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks.…
August 28, 2025
  • Data Breaches

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers…
August 28, 2025
  • Data Breaches

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions…
August 28, 2025
  • Data Breaches

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude…
August 27, 2025
  • Data Breaches

ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government…
August 27, 2025
  • Data Breaches

The 5 Golden Rules of Safe AI Adoption

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace.…
August 27, 2025
  • Data Breaches

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and…
August 27, 2025
  • Data Breaches

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle…
August 27, 2025
  • Data Breaches

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with…
August 26, 2025

Posts pagination

Previous 1 … 35 36 37 … 91 Next
Featured Posts
  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    February 13, 2026
  • Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

    February 13, 2026
  • UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors

    February 13, 2026
  • Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

    February 13, 2026
  • npm’s Update to Harden Their Supply Chain, and Points to Consider

    February 13, 2026
Recent Posts
  • Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

  • Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

Categories
  • Cyber Attacks (5)
  • Data Breaches (897)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0