HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense
Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Cybercriminals Use Fake Apps to Steal Data and Blackmail Users Across Asia’s Mobile Networks

Cybersecurity researchers have discovered a new, large-scale mobile malware campaign that’s targeting Android and iOS platforms with fake…
July 29, 2025
  • Data Breaches

Why React Didn’t Kill XSS: The New JavaScript Injection Playbook

React conquered XSS? Think again. That’s the reality facing JavaScript developers in 2025, where attackers have quietly evolved…
July 29, 2025
  • Data Breaches

CISA Adds PaperCut NG/MF CSRF Vulnerability to KEV Catalog Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a high-severity security vulnerability impacting PaperCutNG/MF print…
July 29, 2025
  • Data Breaches

⚡ Weekly Recap — SharePoint Breach, Spyware, IoT Hijacks, DPRK Fraud, Crypto Drains and More

Some risks don’t breach the perimeter—they arrive through signed software, clean resumes, or sanctioned vendors still hiding in…
July 28, 2025
  • Data Breaches

Email Security Is Stuck in the Antivirus Era: Why It Needs a Modern Approach

Picture this: you’ve hardened every laptop in your fleet with real‑time telemetry, rapid isolation, and automated rollback. But…
July 28, 2025
  • Data Breaches

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

The notorious cybercrime group known as Scattered Spider is targeting VMware ESXi hypervisors in attacks targeting retail, airline,…
July 28, 2025
  • Data Breaches

Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide

Cybersecurity researchers have discovered over a dozen security vulnerabilities impacting Tridium’s Niagara Framework that could allow an attacker…
July 28, 2025
  • Data Breaches

U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) sanctioned a North Korean front company…
July 25, 2025
  • Data Breaches

Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files

The threat actor known as Patchwork has been attributed to a new spear-phishing campaign targeting Turkish defense contractors…
July 25, 2025
  • Data Breaches

Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor

Russian aerospace and defense industries have become the target of a cyber espionage campaign that delivers a backdoor…
July 25, 2025

Posts pagination

Previous 1 … 4 5 6 … 48 Next
Featured Posts
  • Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

    August 7, 2025
  • The AI-Powered Security Shift: What 2025 Is Teaching Us About Cloud Defense

    August 7, 2025
  • Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

    August 7, 2025
  • 6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

    August 7, 2025
  • SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

    August 7, 2025
Recent Posts
  • AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

  • Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools

Categories
  • Cyber Attacks (5)
  • Data Breaches (467)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0