HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks

Samsung has released its monthly security updates for Android, including a fix for a security vulnerability that it…
September 12, 2025
  • Data Breaches

Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms

Apple has notified users in France of a spyware campaign targeting their devices, according to the Computer Emergency…
September 12, 2025
  • Data Breaches

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also…
September 12, 2025
  • Data Breaches

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Dassault Systèmes…
September 12, 2025
  • Data Breaches

Cloud-Native Security in 2025: Why Runtime Visibility Must Take Center Stage

The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now…
September 12, 2025
  • Data Breaches

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity

Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and…
September 11, 2025
  • Data Breaches

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it…
September 11, 2025
  • Data Breaches

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity…
September 11, 2025
  • Data Breaches

Cracking the Boardroom Code: Helping CISOs Speak the Language of Business

CISOs know their field. They understand the threat landscape. They understand how to build a strong and cost-effective…
September 11, 2025
  • Data Breaches

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions using malicious ads and fake…
September 11, 2025

Posts pagination

Previous 1 … 46 47 48 … 108 Next
Featured Posts
  • Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

    March 28, 2026
  • TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

    March 28, 2026
  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

    March 28, 2026
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

    March 27, 2026
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

    March 27, 2026
Recent Posts
  • We Are At War

  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,064)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0