HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
HackenPost blogs HackenPost blogs
0
99
5
90
12
189
0
0
HackenPost blogs HackenPost blogs
  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • News
dark
HackenPost blogs HackenPost blogs
Hand-Picked Top-Read Stories
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
Trending Tags
  • Vulnerability
  • Unauthorized access risks
  • Two-factor authentication best practices
  • Tech
  • System vulnerability patches
  • System security tips
  • Strong password guidelines
  • Stealer
  • Staying informed on cyber threats
  • Security software updates importance
  • Data Breaches

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Threat actors with suspected ties to Russia have been observed taking advantage of a Google account feature called…
June 19, 2025
  • Data Breaches

Meta Adds Passkey Login Support to Facebook for Android and iOS Users

Meta Platforms on Wednesday announced that it’s adding support for passkeys, the next-generation password standard, on Facebook. “Passkeys…
June 19, 2025
  • Data Breaches

FedRAMP at Startup Speed: Lessons Learned

For organizations eyeing the federal market, FedRAMP can feel like a gated fortress. With strict compliance requirements and…
June 18, 2025
  • Data Breaches

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub…
June 18, 2025
  • Data Breaches

Ex-CIA Analyst Sentenced to 37 Months for Leaking Top Secret National Defense Documents

A former U.S. Central Intelligence Agency (CIA) analyst has been sentenced to little more than three years in…
June 18, 2025
  • Data Breaches

CISA Warns of Active Exploitation of Linux Kernel Privilege Escalation Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday placed a security flaw impacting the Linux kernel…
June 18, 2025
  • Data Breaches

Veeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication

Veeam has rolled out patches to contain a critical security flaw impacting its Backup & Replication software that…
June 18, 2025
  • Data Breaches

Are Forgotten AD Service Accounts Leaving You at Risk?

For many organizations, Active Directory (AD) service accounts are quiet afterthoughts, persisting in the background long after their…
June 17, 2025
  • Data Breaches

Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments

Cybersecurity researchers have disclosed three security flaws in the popular Sitecore Experience Platform (XP) that could be chained…
June 17, 2025
  • Data Breaches

Backups Are Under Attack: How to Protect Your Backups

Ransomware has become a highly coordinated and pervasive threat, and traditional defenses are increasingly struggling to neutralize it.…
June 17, 2025

Posts pagination

Previous 1 … 59 60 61 … 88 Next
Featured Posts
  • MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide

    December 29, 2025
  • 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials

    December 29, 2025
  • Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors

    December 29, 2025
  • New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory

    December 27, 2025
  • Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code

    December 26, 2025
Recent Posts
  • China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

  • Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection

Categories
  • Cyber Attacks (5)
  • Data Breaches (870)
  • News (4)
  • Technology (3)
  • Vulnerabilities (2)
HackenPost blogs HackenPost blogs
Designed & Developed by Hackenpost
  • Author
  • About
  • Contact Us
  • Feedback Form
  • Story Archives
0
99
5
90
12
189
0
0