HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Amazon on Friday said it flagged and disrupted what it described as an opportunistic watering hole campaign orchestrated…
August 29, 2025
  • Data Breaches

Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign

An abandoned update server associated with input method editor (IME) software Sogou Zhuyin was leveraged by threat actors…
August 29, 2025
  • Data Breaches

Can Your Security Stack See ChatGPT? Why Network Visibility Matters

Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve…
August 29, 2025
  • Data Breaches

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page

Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to address…
August 29, 2025
  • Data Breaches

FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available

The Sangoma FreePBX Security Team has issued an advisory warning about an actively exploited FreePBX zero-day vulnerability that…
August 29, 2025
  • Data Breaches

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting networks across…
August 28, 2025
  • Data Breaches

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Picture this: Your team rolls out some new code, thinking everything’s fine. But hidden in there is a…
August 28, 2025
  • Data Breaches

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and manage tasks.…
August 28, 2025
  • Data Breaches

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

The maintainers of the nx build system have alerted users to a supply chain attack that allowed attackers…
August 28, 2025
  • Data Breaches

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions…
August 28, 2025

Posts pagination

Previous 1 … 51 52 53 … 108 Next
Featured Posts
  • Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

    March 28, 2026
  • TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

    March 28, 2026
  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

    March 28, 2026
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

    March 27, 2026
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

    March 27, 2026
Recent Posts
  • We Are At War

  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,064)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0