HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added two security flaws impacting Roundcube webmail software…
February 21, 2026
  • Data Breaches

EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security

With $5.5 trillion in global AI risk exposure and 700,000 U.S. workers needing reskilling, four new AI certifications…
February 21, 2026
  • Data Breaches

BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration

Threat actors have been observed exploiting a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and…
February 20, 2026
  • Data Breaches

Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems

In yet another software supply chain attack, the open-source, artificial intelligence (AI)-powered coding assistant Cline CLI was updated…
February 20, 2026
  • Data Breaches

Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and one of their husbands have been indicted in the U.S. for allegedly committing…
February 20, 2026
  • Data Breaches

PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence

Cybersecurity researchers have discovered what they say is the first Android malware that abuses Gemini, Google’s generative artificial…
February 19, 2026
  • Data Breaches

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

An international cybercrime operation against online scams has led to 651 arrests and recovered more than $4.3 million…
February 19, 2026
  • Data Breaches

Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center

Microsoft has disclosed a now-patched security flaw in Windows Admin Center that could allow an attacker to escalate…
February 19, 2026
  • Data Breaches

ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories

The cyber threat space doesn’t pause, and this week makes that clear. New risks, new tactics, and new…
February 19, 2026
  • Data Breaches

CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware

Cybersecurity researchers have disclosed details of a new campaign dubbed CRESCENTHARVEST, likely targeting supporters of Iran’s ongoing protests…
February 19, 2026

Posts pagination

Previous 1 … 4 5 6 … 98 Next
Featured Posts
  • Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux

    March 4, 2026
  • APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2

    March 4, 2026
  • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

    March 4, 2026
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026
  • Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow

    March 3, 2026
Recent Posts
  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

  • Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

Categories
  • Cyber Attacks (5)
  • Data Breaches (964)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0