HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure

Amazon’s threat intelligence team has disclosed details of a “years-long” Russian state-sponsored campaign that targeted Western critical infrastructure…
December 16, 2025
  • Data Breaches

Why Data Security and Privacy Need to Start in Code

AI-assisted coding and AI app generation platforms have created an unprecedented surge in software development. Companies are now…
December 16, 2025
  • Data Breaches

React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors

The security vulnerability known as React2Shell is being exploited by threat actors to deliver malware families like KSwapDoor…
December 16, 2025
  • Data Breaches

Google to Shut Down Dark Web Monitoring Tool in February 2026

Google has announced that it’s discontinuing its dark web report tool in February 2026, less than two years…
December 16, 2025
  • Data Breaches

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every…
December 15, 2025
  • Data Breaches

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX) platform FreePBX, including a critical…
December 15, 2025
  • Data Breaches

⚡ Weekly Recap: Apple 0-Days, WinRAR Exploit, LastPass Fines, .NET RCE, OAuth Scams & More

If you use a smartphone, browse the web, or unzip files on your computer, you are in the…
December 15, 2025
  • Data Breaches

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide range of sectors in…
December 15, 2025
  • Data Breaches

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new ransomware-as-a-service (RaaS) offering called…
December 15, 2025
  • Data Breaches

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless AirLink…
December 13, 2025

Posts pagination

Previous 1 … 4 5 6 … 88 Next
Featured Posts
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

    December 26, 2025
  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

    December 26, 2025
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories

    December 25, 2025
Recent Posts
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds

  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Categories
  • Cyber Attacks (5)
  • Data Breaches (867)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0