HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude…
August 27, 2025
  • Data Breaches

ShadowSilk Hits 35 Organizations in Central Asia and APAC Using Telegram Bots

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government…
August 27, 2025
  • Data Breaches

The 5 Golden Rules of Safe AI Adoption

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace.…
August 27, 2025
  • Data Breaches

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and…
August 27, 2025
  • Data Breaches

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle…
August 27, 2025
  • Data Breaches

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with…
August 26, 2025
  • Data Breaches

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to…
August 26, 2025
  • Data Breaches

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style overlay…
August 26, 2025
  • Data Breaches

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even…
August 26, 2025
  • Data Breaches

⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains, turn…
August 25, 2025

Posts pagination

Previous 1 … 52 53 54 … 108 Next
Featured Posts
  • Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

    March 28, 2026
  • TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

    March 28, 2026
  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

    March 28, 2026
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

    March 27, 2026
  • TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

    March 27, 2026
Recent Posts
  • We Are At War

  • Bearlyfy Hits 70+ Russian Firms with Custom GenieLocker Ransomware

Categories
  • Cyber Attacks (5)
  • Data Breaches (1,064)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0