HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has been…
July 4, 2025
  • Data Breaches

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is happening.…
July 4, 2025
  • Data Breaches

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating systems…
July 4, 2025
  • Data Breaches

Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission

Google has been ordered by a court in the U.S. state of California to pay $314 million over…
July 4, 2025
  • Data Breaches

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to…
July 3, 2025
  • Data Breaches

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal cryptocurrency…
July 3, 2025
  • Data Breaches

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise.…
July 3, 2025
  • Data Breaches

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance, and…
July 3, 2025
  • Data Breaches

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM) and…
July 3, 2025
  • Data Breaches

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written…
July 2, 2025

Posts pagination

Previous 1 … 53 54 55 … 88 Next
Featured Posts
  • MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

    December 29, 2025
  • Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

    December 29, 2025
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
Recent Posts
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

Categories
  • Cyber Attacks (5)
  • Data Breaches (870)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0