HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution
China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign
SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Cybersecurity researchers have disclosed details of a new malicious package on the npm repository that works as a…
December 22, 2025
  • Data Breaches

⚡ Weekly Recap: Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

Cyber threats last week showed how attackers no longer need big hacks to cause big damage. They’re going…
December 22, 2025
  • Data Breaches

Android Malware Operations Merge Droppers, SMS Theft, and RAT Capabilities at Scale

Threat actors have been observed leveraging malicious dropper apps masquerading as legitimate applications to deliver an Android SMS…
December 22, 2025
  • Data Breaches

Iranian Infy APT Resurfaces with New Malware Activity After Years of Silence

Threat hunters have discerned new activity associated with an Iranian threat actor known as Infy (aka Prince of…
December 21, 2025
  • Data Breaches

U.S. DOJ Charges 54 in ATM Jackpotting Scheme Using Ploutus Malware

The U.S. Department of Justice (DoJ) this week announced the indictment of 54 individuals in connection with a…
December 20, 2025
  • Data Breaches

Russia-Linked Hackers Use Microsoft 365 Device Code Phishing for Account Takeovers

A suspected Russia-aligned group has been attributed to a phishing campaign that employs device code authentication workflows to…
December 19, 2025
  • Data Breaches

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a…
December 19, 2025
  • Data Breaches

WatchGuard Warns of Active Exploitation of Critical Fireware OS VPN Vulnerability

WatchGuard has released fixes to address a critical security flaw in Fireware OS that it said has been…
December 19, 2025
  • Data Breaches

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have…
December 19, 2025
  • Data Breaches

New UEFI Flaw Enables Early-Boot DMA Attacks on ASRock, ASUS, GIGABYTE, MSI Motherboards

Certain motherboard models from vendors like ASRock, ASUSTeK Computer, GIGABYTE, and MSI are affected by a security vulnerability…
December 19, 2025

Posts pagination

Previous 1 … 3 4 5 … 89 Next
Featured Posts
  • Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    February 10, 2026
  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

    February 9, 2026
  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

    February 9, 2026
  • ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

    February 9, 2026
  • How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    February 9, 2026
Recent Posts
  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

  • German Agencies Warn of Signal Phishing Targeting Politicians, Military, Journalists

Categories
  • Cyber Attacks (5)
  • Data Breaches (878)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0